RSA

Results: 5605



#Item
361

This outline is a guide for reviewing Drawdown history and process for the Tribal VR Program and fiscal compliance. Utilize these questions in conjunction with the RSA Fiscal Monitoring guide while interviewing the Trib

Add to Reading List

Source URL: tvr-circle.canar.org

Language: English - Date: 2011-09-08 18:20:16
    362

    Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels RSA Laboratories Bedford, MA, USA

    Add to Reading List

    Source URL: www.arijuels.com

    Language: English - Date: 2013-09-23 13:25:09
      363

      Recent Updates to the CHINS Law, RSA 169-D August 23, 2013 Wadleigh, Starr & Peters, P.L.L.C. Serving New Hampshire since 1899

      Add to Reading List

      Source URL: www.wadleighlaw.com

      Language: English - Date: 2015-02-09 00:49:53
        364Cryptography / Integer factorization algorithms / Mathematics / Abstract algebra / Quadratic sieve / General number field sieve / Prime number / Safe prime / Discrete logarithm / RSA / Sieve of Atkin / Quadratic residue

        Integer Factorization and Computing Discrete Logarithms in Maple Aaron Bradford∗, Michael Monagan∗, Colin Percival∗ , , Department of Mathematics, Simon Fr

        Add to Reading List

        Source URL: www.daemonology.net

        Language: English - Date: 2006-05-14 06:12:35
        365

        NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

        Add to Reading List

        Source URL: www.adph.org

        Language: English - Date: 2015-08-03 17:32:01
          366

          On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk RSA Laboratories

          Add to Reading List

          Source URL: www.arijuels.com

          Language: English - Date: 2013-09-25 12:01:42
            367

            NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

            Add to Reading List

            Source URL: www.adph.org

            Language: English - Date: 2015-08-28 11:20:13
              368Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

              Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

              Add to Reading List

              Source URL: isc2015.item.ntnu.no

              Language: English - Date: 2015-09-20 14:16:36
              369Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

              Interfaces for Personal Identity Verification

              Add to Reading List

              Source URL: nvlpubs.nist.gov

              Language: English - Date: 2016-02-16 14:47:45
              370

              Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions Santanu Sarkar, Sourav Sen Gupta, and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

              Add to Reading List

              Source URL: www.souravsengupta.com

              Language: English - Date: 2014-03-16 03:18:01
                UPDATE