Key size

Results: 607



#Item
521Mathematics / Computing / Wireless sensor network / Elliptic Curve DSA / Sensor node / Integrated Encryption Scheme / Program optimization / Elliptic curve / Key size / Finite fields / Cryptography / Elliptic curve cryptography

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks∗ An Liu Department of Computer Science NC State University, Raleigh, NC[removed]email: [removed]

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
522Construction / Development / Infrastructure / Mode of transport / Public transport / Transport / Sustainable transport / Technology

NETWORK INDUSTRIES — TRANSPORT The transport sector represents a key area for growth and competitiveness, not only due to its size but also to its particular function in servicing the other sectors of the economy. Tran

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-05-30 06:14:00
523Advanced Encryption Standard / Standards / Federal Information Processing Standard / Outline of cryptography / NSA Suite B Cryptography / Digital Signature Algorithm / Key size / Federal Information Security Management Act / Data Encryption Standard / Cryptography / Cryptography standards / National Institute of Standards and Technology

NISTIR[removed]NIST Cryptographic Standards and Guidelines Development Process (Draft) The Cryptographic Technology Group

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-18 11:32:45
524Quadratic sieve / Key size / RSA / General number field sieve / Computational complexity theory / TWINKLE / Parallel computing / Key / RSA numbers / Cryptography / Integer factorization algorithms / Key management

Bulletin for PDF[removed]:18 AM

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-06-07 13:00:00
525Integer factorization algorithms / Key management / Electronic commerce / RSA numbers / RSA Factoring Challenge / RSA / PKCS11 / PKCS / Key size / Cryptography / Public-key cryptography / Cryptography standards

Ciphertext Volume 2, No. 1 RSA DATA SECURITY, INC.

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
526Key size / Key / RSA / Paillier cryptosystem / Homomorphic encryption / NTRU / Block cipher / Scantegrity / Electronic voting / Cryptography / Public-key cryptography / Key management

On Key-Sizes for Electronic Voting Sriramkrishnan Srinivasan Chris Culnane James Heather Zhe Xia

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
527Key management / EMC Corporation / Electronic commerce / RSA / PKCS / Key size / Digital signature / Index of cryptography articles / Network Security Services / Cryptography / Public-key cryptography / Cryptography standards

Ciphertext Volume 4, No. 1 RSA DATA SECURITY, INC.

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
528Quadratic sieve / TWINKLE / General number field sieve / RSA / Key size / Factor base / Prime number / Factorization / RSA numbers / Integer factorization algorithms / Cryptography / Mathematics

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-04-25 13:00:00
529Excise / Public key certificate

NEW VENDOR CODE CREATION / CHANGE FORM FOR SUPPLIER Rev 6 – [removed] * - are mandatory *Paste Passport Size Photo

Add to Reading List

Source URL: www.wheelsindia.com

Language: English - Date: 2013-09-11 09:01:38
530Public-key cryptography / Encryption / National Security Agency / Key size / Privacy / Internet privacy / Export of cryptography in the United States / 56-bit encryption / Cryptography / Ethics / Key management

Cyber-Rights and Cyber-Liberties (UK) Encryption and Law Enforcement Cyber-Rights & Cyber-Liberties (UK) Faculty of Law

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-06-15 08:35:20
UPDATE