RSA

Results: 5605



#Item
311

Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata, India su

Add to Reading List

Source URL: www.souravsengupta.com

Language: English - Date: 2014-03-16 03:16:32
    312

    A Rotating Synthetic Aperture (RSA) Space Telescope for Future UV/Opt/IR Astronomical Missions Ronald S. Polidan, Amber Bauermeister, Northrop Grumman Aerospace Systems Gerard Rafanelli, Mitchell Haeri, Raytheon Space an

    Add to Reading List

    Source URL: cor.gsfc.nasa.gov

    Language: English - Date: 2015-04-22 16:51:42
      313

      NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

      Add to Reading List

      Source URL: adph.org

      Language: English - Date: 2015-09-30 14:29:03
        314Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

        A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-02-17 07:57:12
        315Theoretical computer science / Algorithm / Correctness / RSA / Metamath / Symbolic computation / Recursion

        CalculemusThe 16th Symposium on the Integration of Symbolic Computation and Mechanised Reasoning Calculemus 2009 Emerging Trends

        Add to Reading List

        Source URL: www.calculemus.net

        Language: English - Date: 2009-08-28 11:37:21
        316

        The Security Division of EMC RSA OVERVIEW © Copyright 2015 EMC Corporation. All rights reserved. 1

        Add to Reading List

        Source URL: www.emc.com

        Language: English
          317Hashing / Cryptographic hash function / Trie / Merkle tree / RSA / B-tree

          VeriStream – A Framework for Verifiable Data Streaming Dominique Sch¨oder and Mark Simkin Saarland University Saarbr¨ ucken, Germany

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:33:17
          318Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

          Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

          Add to Reading List

          Source URL: people.redhat.com

          Language: English - Date: 2015-09-02 09:27:18
          319

          NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

          Add to Reading List

          Source URL: adph.org

          Language: English - Date: 2015-08-18 12:47:02
            320

            A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1

            Add to Reading List

            Source URL: conf.ncku.edu.tw

            Language: English - Date: 2003-12-17 07:15:58
              UPDATE