Key size

Results: 607



#Item
511SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - preneel_abudhabiv2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-12-11 02:59:17
512European people / Austria / Leopold Kohr / Environmental economics / Manfred Max Neef

Leopold Kohr To be small or not to be at all. That is the question. The large have no future! The future is not great ­ it will be small slow is not only beautiful, but viable Awareness of size and scale are key factors

Add to Reading List

Source URL: www.begegnungszentrum.at

Language: English - Date: 2011-07-01 11:39:28
513Internet protocols / Secure communication / RC4 / Key size / Transport Layer Security / Cryptographic hash function / Cryptanalysis / Py / Block cipher / Cryptography / Stream ciphers / Cryptographic protocols

Microsoft PowerPoint - preneel_closing_isse13v1

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:05:56
514Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
515Tab key / Whitespace / Column / Digital media / Electronic games / Games

ADVERTISING MECHANICAL SPECIFICATIONS-44” SAU 6 COL STANDARD-R.O.P. Advertising Units Columns Actual Size (In.) 1 column 1.53 inches

Add to Reading List

Source URL: www.utads.com

Language: English - Date: 2010-08-10 20:54:11
516Key management / Cryptographic protocols / Elliptic curve cryptography / Key size / IEEE P1363 / PKCS / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Diffie–Hellman key exchange / Cryptography / Cryptography standards / Public-key cryptography

Microsoft Word - medea03-v9.doc

Add to Reading List

Source URL: vega.dii.unisi.it

Language: English - Date: 2003-09-04 12:55:08
517Data Encryption Standard / RC6 / Cryptographic software / Cipher / Key size / Triple DES / Serpent / XSL attack / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

136 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010 Switching between the AES-128 and AES-256 Using Ks * & Two Keys

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2014-03-16 20:13:45
518Secure Shell / Key generation / RSA / X.509 / Key size / Certificate authority / Digital signature / Public key fingerprint / Ssh-keygen / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-11 15:38:00
519Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
520Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:33:10
UPDATE