Modes

Results: 2915



#Item
771Initialization vector / Symmetric-key algorithm / Stream cipher / Block size / Ciphertext / RC4 / Triple DES / Cipher / Crypto++ / Cryptography / Block cipher modes of operation / Block cipher

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
772Science / Hubble Space Telescope / European Southern Observatory / Robotic telescope / Space Telescope Science Institute / Observatory / Optical telescope / ASTRON / Mauna Kea Observatories / Astronomy / Observational astronomy / Telescopes

RPT-PS-G0061 New Observing Modes for the Next Century A Workshop Summary Workshop held July 6-8, 1995, in Hilo, Hawaii Matt Mountain

Add to Reading List

Source URL: www.gemini.edu

Language: English - Date: 2008-05-30 19:38:33
773Technology / Command and Data modes / Hayes command set / Hayes Microcomputer Products / 56 kbit/s modem / RS-232 / Serial port / Data Carrier Detect / Voice modem command set / Modems / OSI protocols / Computing

High Performance V.90/K56Flex/V.34+/V.42bis 56K BPS Plug & Play External Voice/FAX/Data Modem With Advanced

Add to Reading List

Source URL: www.modem.od.ua

Language: English - Date: 2013-08-16 08:06:30
774

1 Compensation of the Null modes with the Gemini MCAO Gemini Do ument RTP-AO-G0097 Fran ois Rigaut. February 29, 2000

Add to Reading List

Source URL: www-sbf.gemini.edu

Language: English - Date: 2012-08-20 16:03:49
    775

    Utiliser Dokiel pour écrire des documentations logicielles Durée, en heures : 21  connaître les modes de déploiement

    Add to Reading List

    Source URL: www.scenari-enterprise.com

    Language: French - Date: 2015-05-27 07:52:42
      776HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

      Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2011-08-15 15:03:54
      777Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

      YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2015-04-13 14:47:47
      778Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption

      Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2008-03-13 10:38:18
      779Operational amplifier / Multiplexer / Microcontrollers / Electronic engineering / Computer hardware / Electronics

      w WAN_0115 MODE8X AND DUAL DIFFERENTIAL MODES ON THE WM8716/40 HIGH PERFORMANCE STEREO DACs

      Add to Reading List

      Source URL: www.cirrus.com

      Language: English - Date: 2015-01-21 11:10:59
      780Computing / Technology / Hayes command set / Command and Data modes / Fax / Conexant / 56 kbit/s modem / AS/400 Control Language / High-Level Data Link Control / Modems / OSI protocols / Logical Link Control

      Commands for HostProcessed and HostControlled Modems Reference Manual Conexant Proprietary Information Doc. No. 100498D

      Add to Reading List

      Source URL: ftp.df.lth.se

      Language: English - Date: 2005-06-20 15:27:11
      UPDATE