Key generation

Results: 481



#Item
331Provinces and territories of Canada / Ontario Energy Board / Ontario Power Generation / Ontario electricity policy / Ontario / Ontario Hydro

Ontario Energy Board[removed]Business Plan Achievements Our Performance The OEB measures its performance using a balanced scorecard approach. Performance indicators are put in place to support five key focal areas def

Add to Reading List

Source URL: www.ontarioenergyboard.ca

Language: English
332Cryptographic software / Advanced Encryption Standard / AES instruction set / Message authentication codes / Galois/Counter Mode / CLMUL instruction set / OpenSSL / Nehalem / Key generation / Cryptography / X86 architecture / X86 instructions

WHITE PAPER AN EVALUATION OF NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING SELECTED CRYPTOGRAPHIC ALGORITHMS

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2011-10-28 14:45:02
333Energy policy / Energy development / Smart grid / Smart meter / Low-carbon economy / Energy storage / Energy industry / Distributed generation / Sustainable energy / Energy / Technology / Energy economics

® Coping with the Energy Challenge The IEC’s role Smart electrification – The key to energy efficiency Summary and Recommendations

Add to Reading List

Source URL: www.iec.ch

Language: English - Date: 2010-12-10 12:51:32
334ID-based encryption / Public key infrastructure / Key generation / X.509 / Key / ID-based cryptography / Pretty Good Privacy / Cryptography / Public-key cryptography / Key management

Identity-Based Encryption with Conventional Public-Key Infrastructure Jon Callas PKI ‘05

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-20 03:22:08
335Electric power / Renewable energy / Electricity generation / Photovoltaic system / Smart grid / Technology / Energy / RWE

EUROBAT 2012 Session 3 Why is Battery Storage One of the Key Solutions RWE Deutschland AG, New Technologies Thomas Theisen

Add to Reading List

Source URL: www.eurobat.org

Language: English - Date: 2014-02-05 13:00:52
336Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
337Energy policy in the United States / Chemistry / Coal / Economic geology / Fuels / Electricity generation / Energy policy of the United States / Sustainable energy / Natural gas / Energy / Energy economics / Chemical engineering

GAO-13-72, Electricity: Significant Changes Are Expected in Coal-Fueled Generation, but Coal is Likely to Remain a Key Fuel Source

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-11-28 12:41:42
338Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
339Fingerprints / Law enforcement / National security / Law enforcement in the United States / Criminal record / Federal Bureau of Investigation / Next Generation Identification / Public key fingerprint / Background check / Security / Biometrics / Identification

NON-CRIMINAL JUSTICE APPLICANT’S PRIVACY RIGHTS As an applicant that is the subject of a Georgia only or a Georgia and Federal Bureau of Investigation (FBI) national fingerprint/biometric-based criminal history record

Add to Reading List

Source URL: gbi.georgia.gov

Language: English - Date: 2013-09-16 09:08:54
340Electronic commerce / Cryptographic protocols / Secure communication / Extended Validation Certificate / Public key certificate / Certificate authority / Phishing / X.509 / Internet Explorer 7 / Cryptography / Key management / Public-key cryptography

Te c h n o l o g y B r i e f Raising the Bar: Extended Validation SSL Certificates The Next Generation of SSL Certificates

Add to Reading List

Source URL: www.blacksun.ca

Language: English - Date: 2009-01-06 12:21:08
UPDATE