Key size

Results: 607



#Item
261Notary / Export Control Classification Number / United States Department of Commerce / Digital signature / Key size / Key / Authentication / Cryptography / Key management / Public-key cryptography

Director-General of Trade and Industry (Attn.: Classification Section, Strategic Trade Controls Branch) 5/F, Trade and Industry Department Tower 700 Nathan Road, Kowloon Hong Kong Fax No.: [removed]

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2013-01-08 02:34:07
262Security Target / Hardware-based full disk encryption / Common Criteria / Authentication / Public-key cryptography / Password / Key size / Protection Profile / Key / Cryptography / Key management / Evaluation

Supporting Document Mandatory Technical Document Full Drive Encryption: Authorization Acquisition January 2015

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-02-27 15:31:27
263Computer security / Password / Key size / FIPS 140-2 / Export of cryptography in the United States / Cryptography / Security / Key management

____________________________________________________________________ DUAL-USE LIST - CATEGORY 5 – PART 2 – "INFORMATION SECURITY" ____________________________________________________________________ _______________

Add to Reading List

Source URL: www.wassenaar.org

Language: English - Date: 2015-02-12 11:01:27
264Key management / Elliptic curve cryptography / IEEE P1363 / MQV / Integrated Encryption Scheme / Elliptic curve / Key size / SECG / Digital signature / Cryptography / Public-key cryptography / Cryptography standards

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:11
265Key management / Quantum key distribution / Cipher / One-time pad / BB84 / Key size / Gilbert Vernam / Public-key cryptography / Symmetric-key algorithm / Cryptography / Quantum cryptography / Quantum information science

High Bit Rate Quantum Key Distribution Systems 5th Year Project Report[removed]Moritz Lenz∗ Heriot Watt Universitiy (Dated: February 16, 2007) Various improvements where applied to an existing Quantum Key Distributio

Add to Reading List

Source URL: moritz.faui2k3.org

Language: English - Date: 2007-03-16 06:52:53
266Monomial / Mathematics / Algebra / Homogeneous polynomials

Partial Key Exposure Attacks on RSA up to Full Size Exponents Matthias Ernst1 , Ellen Jochemsz2? , Alexander May1? , and Benne de Weger2? 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
267Public-key cryptography / Advanced Encryption Standard / Key size / Encryption software / National Security Agency / Junger v. Daley / Cipher / International Data Encryption Algorithm / Export of cryptography in the United States / Cryptography / Key management / Cryptographic software

Microsoft Word - _5_Perkinsg1.doc

Add to Reading List

Source URL: www.houstonlawreview.org

Language: English - Date: 2006-04-22 01:31:03
268Statistics / 2000–01 National Basketball Association Eastern Conference playoff leaders / Iris flower data set

Chart 3. THE STATUS OF NEW JOB OPENINGS FOR GENERAL EMPLOYMENT BY KEY INDUSTRY AND BY SIZE ○ The status of new job openings for general employment by key industry and by size (excluding new school graduates) Industry,

Add to Reading List

Source URL: www.mhlw.go.jp

Language: English - Date: 2015-01-29 18:32:12
269User interface techniques / Computing / Text box / Undo / Option key / Keyboard shortcut / Shift key / Computer keyboard / Control key / Human–computer interaction / Software

Balsamiq Mockups Keyboard Shortcuts SIZE / POSITION SELECTION

Add to Reading List

Source URL: media.balsamiq.com

Language: English - Date: 2013-09-12 17:07:49
270Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
UPDATE