RSA

Results: 5605



#Item
441Computer network security / CVSS / Security / Vulnerability / Social vulnerability / Qualys / Metric / Computer security / Cyberwarfare / Risk

The Common Vulnerability Scoring System Mike Schiffman, Cisco Systems The RSA Conference, February 2005 Today’s Agenda

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2005-02-23 13:47:09
442

Split Knowledge Generation Of RSA Parameters

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2013-11-13 00:20:30
    443Coursework / General Certificate of Secondary Education / Test / Oxford /  Cambridge and RSA Examinations / GCE Advanced Level / Education / Evaluation / Joint Council for Qualifications

    The Pupil Parent Partnership

    Add to Reading List

    Source URL: www.theppp.org.uk

    Language: English - Date: 2014-02-11 10:33:16
    444Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

    Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2009-09-07 10:57:44
    445Electronic commerce / Integer factorization algorithms / RSA / Prime number / Modular arithmetic / Coprime / Euclidean algorithm / Greatest common divisor / Cryptography / Mathematics / Public-key cryptography

    Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2011-03-23 04:16:10
    446Cannabinoids / Cannabinoid / Cannabaceae / Rosales / Phenols / Synthetic cannabis / Cannabis / Neurochemistry

    NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

    Add to Reading List

    Source URL: adph.org

    Language: English - Date: 2015-06-03 16:46:54
    447Semantic security / Optimal asymmetric encryption padding / Cipher / RSA / Advantage / Encryption / Side channel attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

    main_CameraReadyFormatting.dvi

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2012-05-14 19:11:08
    448Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

    An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-07-21 08:57:56
    449Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    450Cross-platform software / Platform as a service / Cross-site request forgery / Timing attack / Password / Advantage / JavaScript / RSA / HTTP cookie / Cryptography / Computing / Cloud computing

    Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

    Add to Reading List

    Source URL: pages.cs.wisc.edu

    Language: English - Date: 2014-12-20 11:41:32
    UPDATE