Padding

Results: 316



#Item
11Foam Padding We protect your product Short description The padding, mainly foam and cardboard, is developed according to the sensitivity of the article

Foam Padding We protect your product Short description The padding, mainly foam and cardboard, is developed according to the sensitivity of the article

Add to Reading List

Source URL: www.anaxa.ch

- Date: 2015-04-21 08:35:35
    12Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

    Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English
    13The Politics of Cryptography: Bitcoin and The Ordering Machines

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    14Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:12
    15MMA Technical Standards Board/ AMEI MIDI Committee Letter of Agreement for Recommend Practice ID3 Metadata for XMF Files (RP-047) Originated By: MMA

    MMA Technical Standards Board/ AMEI MIDI Committee Letter of Agreement for Recommend Practice ID3 Metadata for XMF Files (RP-047) Originated By: MMA

    Add to Reading List

    Source URL: amei.or.jp

    Language: English - Date: 2016-07-26 01:00:23
    16The Politics of Cryptography: Bitcoin and The Ordering Machines

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: www.iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    17ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2016-05-02 12:28:32
    18Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

    Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

    Add to Reading List

    Source URL: www.cits.rub.de

    Language: English - Date: 2014-11-18 10:03:56
    19Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

    Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-05-10 09:46:08
    20Randomized Partial Checking Revisited Shahram Khazaei,  Douglas Wikstr¨om,  February 13, 2012  Abstract

    Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 09:04:05