Key size

Results: 607



#Item
271Public-key cryptography / Cipher / Triple DES / Symmetric-key algorithm / Block cipher / Blowfish / Key size / Key / Advanced Encryption Standard / Cryptography / Key management / Data Encryption Standard

Volume 2, Issue 7, July[removed]ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering

Add to Reading List

Source URL: www.ijarcsse.com

Language: English - Date: 2014-02-16 11:55:40
272Polynomial / Key size / RSA / Cyberwarfare / Applied mathematics / Security / Key management / Public-key cryptography / Key distribution

Volume 12, number 1 INFORMATIONPROCESSINGLETTERS 13 February 1981

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-20 13:58:24
273Computer security / XTR / Key size / Group key / Diffie–Hellman key exchange / Key distribution / Security / Key management / Cyberwarfare / Key distribution center

A Scalable Method for Access Control in Location-Based Broadcast Services Mudhakar Srivatsa† , Arun Iyengar† , Jian Yin‡ and Ling Liu‡ IBM T.J. Watson Research Center† College of Computing, Georgia Tech†

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2008-03-08 00:23:57
274Mechanisms / Steering column / Full-size vehicles / Steering wheel / Cadillac Sedan de Ville / Key / Steering / Transport / Private transport / Mechanical engineering

1988 Cadillac DeVille V8[removed]5L Copyright © 2006, ALLDATA 8.80

Add to Reading List

Source URL: ww2.justanswer.com

Language: English - Date: 2009-09-05 10:32:31
275

Cutting List KEY QTY. SIZE & DESCRIPTION

Add to Reading List

Source URL: hostedmedia.reimanpub.com

- Date: 2013-03-25 12:49:56
    276Video cards / Video game hardware / CUDA / Nvidia / Advanced Encryption Standard / RSA / NTRU / AES instruction set / Key size / Cryptography / Graphics hardware / GPGPU

    SSLShader: Cheap SSL Acceleration with Commodity Processors Keon Jang+ , Sangjin Han+ , Seungyeop Han* , Sue Moon+ , and KyoungSoo Park+ + KAIST *University of Washington

    Add to Reading List

    Source URL: an.kaist.ac.kr

    Language: English - Date: 2011-04-04 22:37:44
    277Key size / Wireless security / Advanced Encryption Standard / Cipher / Encryption / Encryption software / Encrypting File System / Cryptography / Cryptographic software / Key management

    Revolabs Executive HD™ MaxSecure Whitepaper[removed]Revolabs

    Add to Reading List

    Source URL: starin.biz

    Language: English - Date: 2013-01-31 15:16:13
    278Public key certificate / Verification / Key management / Public-key cryptography / Electronic commerce

    TEACHERS RECRUITMENT – D.S.C. 2012 :: PRAKASAM DISTRICT CHECH LIST FOR VERIFICATION OF CERTIFICATES FOR SELECTED CANDIDATES ( Pl. encloseTwo passport size photo graphs same as uploaded in the DSC Application[removed]Ca

    Add to Reading List

    Source URL: www.deoprakasam.net

    Language: English - Date: 2012-12-02 11:40:42
    279Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

    About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

    Add to Reading List

    Source URL: www.axantum.com

    Language: English - Date: 2014-05-04 18:08:46
    280Cryptography standards / Internet standards / Secure communication / RSA / PKCS / Transport Layer Security / Padding / Chosen-ciphertext attack / Key size / Cryptography / Public-key cryptography / Electronic commerce

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma♣, Ondřej Pokorný1 and Tomáš Rosa2,♣ 2 1 ICZ, Prague, Czech Republic Dept. of Computer Science and Eng., FEE, Czech Technical University in Prague

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-08-29 14:13:55
    UPDATE