Padding

Results: 316



#Item
11

Foam Padding We protect your product Short description The padding, mainly foam and cardboard, is developed according to the sensitivity of the article

Add to Reading List

Source URL: www.anaxa.ch

- Date: 2015-04-21 08:35:35
    12Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

    Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English
    13Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    14Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

    Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:12
    15Computing / Computer file formats / Data / Information / ID3 / JPEG / UTF-8 / Tar / Padding / Synchsafe

    MMA Technical Standards Board/ AMEI MIDI Committee Letter of Agreement for Recommend Practice ID3 Metadata for XMF Files (RP-047) Originated By: MMA

    Add to Reading List

    Source URL: amei.or.jp

    Language: English - Date: 2016-07-26 01:00:23
    16Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: www.iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    17Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

    ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2016-05-02 12:28:32
    18Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

    Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

    Add to Reading List

    Source URL: www.cits.rub.de

    Language: English - Date: 2014-11-18 10:03:56
    19Cryptography / Error detection and correction / E-commerce / RSA / Digital signature forgery / Digital signature / EMV / Optimal asymmetric encryption padding / Hamming weight / Hash function / Byte

    Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-05-10 09:46:08
    20Cryptography / RSA / Cipher / Cryptosystem / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext indistinguishability

    Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 09:04:05
    UPDATE