Key size

Results: 607



#Item
471Performance management / School Improvement Grant / Management / Race to the Top / Project management

Performance Management Description and Key Elements Reforms of the size and scale of those that Race to the Top States are undertaking require more comprehensive oversight, planning and problem solving than most state ed

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2013-03-08 11:59:47
472Transport Layer Security / Public key infrastructure / Digital signature / Symmetric-key algorithm / Public key certificate / Crypt / Key size / Network Security Services / Certificate server / Cryptography / Public-key cryptography / Key management

Canada Customs Agence des douanes and Revenue Agency et du revenu du Canada Unclassified

Add to Reading List

Source URL: www.cra-arc.gc.ca

Language: English - Date: 2005-10-29 12:08:24
473Standards / Standards for Security Categorization of Federal Information and Information Systems / Federal Information Processing Standard / Key size / Computer security / Evaluation / Reference / National Institute of Standards and Technology / Cryptography standards / FIPS 140-2

ITL Bulletin for January[removed]A Profile of the Key Management Framework for the Federal Government

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-09 14:05:39
474Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
475ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
476Key management / Public-key cryptography / Quantum key distribution / Secure Communication based on Quantum Cryptography / European Telecommunications Standards Institute / ETSI Satellite Digital Radio / Cryptographic primitive / Key size / Information-theoretic security / Cryptography / Quantum cryptography / Quantum information science

ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-06-04 11:14:44
477Cryptographic protocols / Key management / Secure Communication based on Quantum Cryptography / Quantum key distribution / Cryptographic primitive / Public-key cryptography / Symmetric-key algorithm / Man-in-the-middle attack / Key size / Cryptography / Quantum cryptography / Quantum information science

New Journal of Physics The open–access journal for physics Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger1 and Gaby Lenhart2

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2009-05-28 06:20:00
478Cipher / Symmetric-key algorithm / UES / NTRU / Key size / Q / Cryptography / Block ciphers / Elliptic curve cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:52:01
479United Nations / Sustainability / Environmentalism / Cultural diversity / Cultural geography / UNESCO / International development / Sustainable development / Social sustainability / Environment / Environmental social science / Structure

Plenary Session: High Level Discussion Segment 1 Culture in the Post-2015 Sustainable Development Agenda Why Culture is Key to Sustainable Development Background Note1 The “one size does not fit all” motto places cu

Add to Reading List

Source URL: www.unesco.org

Language: English - Date: 2013-05-24 07:58:35
480Public-key cryptography / Data security / Cryptography standards / Information security / FIPS 140-2 / Domain Name System Security Extensions / Federal Information Security Management Act / Key size / Public key infrastructure / Cryptography / Computer security / Key management

Draft Special Publication[removed]Part 3 Revision 1, Recommendation for Key Management (Part 3: Application-Specific Key Management Guidance)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-05 11:13:06
UPDATE