Padding

Results: 316



#Item
21Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
22Perfect Protective Packaging  Perfect Protective Packaging PAPERplus® - paper padding for perfect protective packaging

Perfect Protective Packaging Perfect Protective Packaging PAPERplus® - paper padding for perfect protective packaging

Add to Reading List

Source URL: www.storopack.com

Language: English - Date: 2016-06-28 02:47:15
23EFFICIENT DEALIASED CONVOLUTIONS WITHOUT PADDING∗ JOHN C. BOWMAN† AND MALCOLM ROBERTS† SIAM J. Sci. Comput., 33:1, Abstract. Algorithms are developed for calculating dealiased linear convolution sums

EFFICIENT DEALIASED CONVOLUTIONS WITHOUT PADDING∗ JOHN C. BOWMAN† AND MALCOLM ROBERTS† SIAM J. Sci. Comput., 33:1, Abstract. Algorithms are developed for calculating dealiased linear convolution sums

Add to Reading List

Source URL: www.math.ualberta.ca

Language: English - Date: 2016-02-21 19:03:42
24Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com.  DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Add to Reading List

Source URL: drownattack.com

Language: English - Date: 2016-07-01 21:14:30
25Microsoft PowerPoint - NPROM-zhang.pptx

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
26: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2012-11-01 12:03:04
27scandinavia  scandinavia Scandinavia is a wonderful and relaxing seat, thanks to its extra soft padding. The cushions can be turned over and the upholstery is removable, even from the frame. The design is simple, natura

scandinavia scandinavia Scandinavia is a wonderful and relaxing seat, thanks to its extra soft padding. The cushions can be turned over and the upholstery is removable, even from the frame. The design is simple, natura

Add to Reading List

Source URL: www.kinnarps.lt

Language: English - Date: 2014-10-07 07:43:42
28On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-12-10 09:12:20
29Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
30Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1  University of Illinois at Urbana-Champaign

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05