Key size

Results: 607



#Item
171Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
172National Security Agency / Block ciphers / Skipjack / Capstone / Fortezza / Key size / CDMF / Key / Symmetric-key algorithm / Cryptography / Key management / Data Encryption Standard

How to Reverse Engineer an EES Device Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:49
173Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
174Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
175Electronic Frontier Foundation / Snuffle / Daniel J. Bernstein / International Traffic in Arms Regulations / Bernstein / Key size / National Security Agency / Junger v. Daley / Export of cryptography in the United States / Cryptography / Security / Bernstein v. United States

Harvard Journal o f Law & Technology Volume 10, Number 3 Summer 1997 C R Y P T O G R A P H Y , E X P O R T C O N T R O L S , AND T H E F I R S T A M E N D M E N T IN B E R N S T E I N V. UNITED S T A T E S

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:38:44
176Fasteners / Manufacturing / Nut / Washer / M12 / M10 / Wrench / Hex key / Threaded rod / Screws / Construction / Technology

CAP SCREW HEAD WRENCH SIZE CHART Phone: • Fax: • www.imperialsupplies.com 10.9 ANSI-ISO Metric Measurement Cap Screw Diameter

Add to Reading List

Source URL: www.imperialsupplies.com

Language: English - Date: 2011-05-18 16:33:33
177UCAS / Doctor of Philosophy / Key Skills Qualification / University and college admissions / Higher education in the United Kingdom / Cheltenham

Size and Structure A maximum of 4,000 characters (or 47 lines of text) is to be used in the personal statement so you must ensure that you structure your personal statement sensibly to include all of the key areas. As yo

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2012-07-23 11:54:37
178Advanced Encryption Standard / Key size / Encryption / Universal Serial Bus / Brute-force attack / Comparison of encrypted external drives / Aloaha / Cryptography / Disk encryption / Cryptographic software

“With real-time AES hardware encryption, software free design and CESG CCTM accreditation, the iStorage diskG is the World’s most secure,

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2013-10-17 12:30:54
179Advanced Encryption Standard / Block ciphers / S-box / Weak key / ICE / Differential cryptanalysis / Key size / MARS / Cryptanalysis / Cryptography / Key management / Twofish

Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
180Benchmark / Computer performance / Electronics / Advanced Encryption Standard / Key size / NBench / Technology / Coremark / Embedded systems / EEMBC / Computing

Microsoft Word - 070702_denbench_db.doc

Add to Reading List

Source URL: www.eembc.org

Language: English - Date: 2013-04-08 17:04:32
UPDATE