Key size

Results: 607



#Item
121Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
122Shore Riders ATV Club / ATVs / All-terrain vehicle / Transport

SVIA and ASI to Address Safety Issues at CPSC Regional ATV Safety Hearing in West Virginia State Legislation, Rider Training, Following Recommended Age/Size and Usage Guidelines, and Parental Supervision are Key To Impro

Add to Reading List

Source URL: www.atvsafety.org

Language: English - Date: 2014-10-07 14:55:28
123Internet protocols / Key management / Public-key cryptography / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Key size / Secure Shell / Key / Cryptography / Secure communication / Cryptographic protocols

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila∗, Stephen Fung* , Sheueling Chang Shantz, Nils Gura, Hans Eberle Sun Microsystems, IncCasey Avenue

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:42
124Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2010-08-18 22:10:28
125Typography / Digital typography / Hebrew diacritics / Graphic design / Arial / Insert key / Cedilla

Overtype the abstract title here, Times New Roman or Arial, bold, font size 11 Overtype the authors’ names here, Times New Roman or Arial, regular, font size 11 Overtype the authors’ affiliations here, Times New Rom

Add to Reading List

Source URL: www.rsc.org

Language: English - Date: 2015-04-29 02:57:10
126Daminozide / Elliptic curve cryptography / Key size / Computing / Telecommunications engineering / Technology / Sensors / Wireless sensor network

SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node 1 1 1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:02:17
127Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
128Post-quantum cryptography / Key size / Cloud computing / Alice and Bob / Cryptography / Quantum cryptography / Quantum information science

PQCRYPTO project in the EU Tanja Lange 3 April 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:35:45
129Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
130Key size / Public-key cryptography / Whitfield Diffie / Key-agreement protocol / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
UPDATE