RSA

Results: 5605



#Item
261Regional Studies Association / Regional science / RSA Security / Royal Society of Arts / RSA / Academia / Ambassador / United Kingdom / Government

Regional Studies Association RSA Ambassador Guidelines Rationale The Regional Studies Association is a leading and impactful community at the forefront of policy debates and the analysis of regional issues. The Associati

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2015-12-21 06:19:28
262Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
263Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
264Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Add to Reading List

Source URL: isi.jhu.edu

Language: English - Date: 2016-03-21 17:23:50
265Cryptography / Encryption / ElGamal encryption / Mix network / Ciphertext / Public-key cryptography / RSA / Cipher / Identity-based conditional proxy re-encryption / Proxy re-encryption

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
266

Le forfait bloqué spécial RSA Date de mise à jour : Le forfait bloqué spécial RSA est disponible avec les couvertures réseaux d’Orange suivantes : GSM / GPRS / EDGE / 3G / 3G+ pour un usage depuis un m

Add to Reading List

Source URL: boutique.orange.fr

Language: French - Date: 2016-04-16 20:02:15
    267Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

    Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:50:20
    268Insurance / RSA Insurance Group / Types of insurance / Vehicle insurance / Liability

    SW_Black text Blue_Yellow

    Add to Reading List

    Source URL: www.suttonwinson.com

    Language: English - Date: 2015-10-12 12:00:33
    UPDATE