Padding

Results: 316



#Item
151Key management / RSA / Key / Optimal asymmetric encryption padding / IEEE P1363 / PKCS1 / Cryptography / Public-key cryptography / Cryptography standards

NIST SP 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:58:54
152London / Jorvik Viking Centre / Scandinavian York / Viking / London Zoo / Viking Age / Legoland / Listed buildings in England

Mus t -s ees It’s Padding ton’s first time in Britain so follow in his pawsteps and be amazed by all there is to see and do. T ick these must-see attractions off your list! Map data ©2014 Basarsoft, GeoBasis-DE/BKG

Add to Reading List

Source URL: lovewall.visitbritain.com

Language: English - Date: 2014-10-28 12:29:55
153Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
154Law / Surveillance / Phencyclidine / Piperidines / Police / Probabilistically checkable proof / Law enforcement agency / Law enforcement / National security / Security

European Network of Law Enforcement Technology Services Enlets PCP Briefing P.Padding , Core group leader 15 Nov 2013

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-11-27 06:52:52
155Main Page

aboutDialog{padding:0px0px10px0px;width:299px;}#modes{min height:380px;}#clientBox{background image:url(“chrome://branding/content/about.png”);background repeat:no repeat;background olor:#FFFFFF;padding top:203px;col

Add to Reading List

Source URL: www.senecacollege.ca

Language: English - Date: 2013-11-05 11:55:05
    156Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

    X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 11:02:04
    157Kayaking / Watercraft / Water / Transport / Kayakers / Kayak / Paddle / Brian Welch

    Just Keep Padding By Lucy Sears, Bethesda, MD I wonder how many people have died out here. This thought raced through my mind as I peered out at the rapidly moving water—white with foam and heading to the seemingly end

    Add to Reading List

    Source URL: www.bethesda.org

    Language: English - Date: 2014-07-08 11:24:28
    158Electronics / Science / Cryptography / BMP file format / JPEG / Data compression / Padding / Transport Layer Security / Computing / Graphics file formats / Formal sciences

    TLS Compression Fingerprinting and a Privacy-aware API for TLS Karthikeyan Bhargavan, INRIA, [removed] C´edric Fournet, Microsoft Research, [removed] Markulf Kohlweiss, Microsoft Researc

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2012-05-29 03:39:10
    159Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

    CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2009-10-16 16:58:33
    160Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

    CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2009-10-16 16:58:36
    UPDATE