RSA

Results: 5605



#Item
861Internet protocols / Internet standards / Software token / Authentication / RADIUS / Transaction authentication number / Access token / Password / One-time password / Security / Computer security / Security token

CAT - ONLINE IDENTITY PROTECTION! Do you have the same problem ? "With CAT we succeeded to wake up from a nightmare of handling RSA cards, for thousands of employees, tracking who lost it, who forgot it or who just left

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2009-08-11 05:39:52
862Special number field sieve / Integer factorization / General number field sieve / Factorization / RSA / Lenstra elliptic curve factorization / Factor base / Quadratic sieve / Integer factorization records / Integer factorization algorithms / Cryptography / Mathematics

A kilobit special number field sieve factorization Kazumaro Aoki1 , Jens Franke2 , Thorsten Kleinjung2 , Arjen K. Lenstra3 , and Dag Arne Osvik3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-31 05:26:07
863Accelerator / RSA / Key / Cryptographic accelerator / Kerberos / Advanced Encryption Standard / PKCS / Network Security Services / Cryptography / Public-key cryptography / Electronic commerce

Cryptography as a Network Service Tom Berson Xerox PARC‡ Drew Dean Xerox PARC

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:15:46
864Oxford /  Cambridge and RSA Examinations / Education / Evaluation / General Certificate of Secondary Education

PDF Document

Add to Reading List

Source URL: schoolshistoryproject.org.uk

Language: English - Date: 2015-04-21 10:48:20
865Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
866Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
867Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
868Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
869Multilingualism / General Certificate of Secondary Education / Oxford /  Cambridge and RSA Examinations / Official bilingualism in Canada / Bilingualism: Language and Cognition / English as a foreign or second language / Free-standing Mathematics Qualifications / Education / Language acquisition / Bilingualism

Microsoft Word - LettertoDfE1stofApril.doc

Add to Reading List

Source URL: www.philsoc.org.uk

Language: English - Date: 2015-04-07 11:14:45
870RSA / Cyberwarfare / Applied mathematics / Mathematics / Classical cipher / Cryptography / Code / Cipher

Mathematics Enhancement Programme Codes and Ciphers

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 12:59:37
UPDATE