Outline of cryptography

Results: 51



#Item
11Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2015-02-03 21:03:02
12Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-02-25 14:14:07
13State Of The Art  The Result A Proof Outline

State Of The Art The Result A Proof Outline

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
14Microsoft PowerPoint - Rechberger_IDEA_v2

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
15Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland

Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland

Add to Reading List

Source URL: www.infsec.ch

Language: English - Date: 2014-11-20 07:42:12
16Rec14 proposed outline v2.0 as of 20/Dec[removed]Part[removed].

Rec14 proposed outline v2.0 as of 20/Dec[removed]Part[removed].

Add to Reading List

Source URL: www1.unece.org

Language: English - Date: 2012-12-20 10:52:20
17Electronic signature / Doctor of Philosophy / Civil law / Portable Document Format / Digital signature / Cyberwarfare / Cryptography / Electronic documents / Computing

Q. I am currently in receipt of a stipend from another source. Am I eligible to apply to the SRF Phd fund? A. Yes, you can apply. You must clearly outline in your application the amount and duration dates of your curren

Add to Reading List

Source URL: www.ucc.ie

Language: English - Date: 2014-10-16 06:29:34
18New Hampshire Insurance Laws and Regulations Tab A - Outline of Current Rate Review Process Tab B - Summary of Impact of Significant ACA Provisions Tab C - Comparison of Regulatory Provisions by License Tab D – Compari

New Hampshire Insurance Laws and Regulations Tab A - Outline of Current Rate Review Process Tab B - Summary of Impact of Significant ACA Provisions Tab C - Comparison of Regulatory Provisions by License Tab D – Compari

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2013-03-10 05:00:00
19X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi <a-yamagi@ipa.go.jp> User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
20Math 135: The Art of Secret Writing (Summer[removed]The Theoretically Possible Number of Enigma Configurations We outline the calculation of the number of theoretically possible Enigma configurations. The calculation uses

Math 135: The Art of Secret Writing (Summer[removed]The Theoretically Possible Number of Enigma Configurations We outline the calculation of the number of theoretically possible Enigma configurations. The calculation uses

Add to Reading List

Source URL: stat.math.uregina.ca

Language: English - Date: 2006-08-03 15:13:18