RSA

Results: 5605



#Item
871Fingerprints / Science / Criminology / Forensic science / Heuristics / Crime scene / Canadian Identification Society / International Association for Identification / Federal Bureau of Investigation / Law enforcement / Law / Biometrics

Ron Smith & Associates, Inc. P.O. Box 670 • Collinsville• Mississippi • 39325 Toll Free: 1-866-TEAM RSA) • Office • Fax • www.ronsmithandassociates.com Curriculum Vita

Add to Reading List

Source URL: www.ronsmithandassociates.com

Language: English - Date: 2013-10-15 09:38:19
872Water / Boundary / Real estate / Hedge / Presumption / NH RSA Title I / Intertidal zone / Physical geography / Fences / Geography

evonshires solicitors IT’S THE LAW: Boundaries The Chinese Government says that the Great Wall of China is probably about 8,850km long – but that they’re not entirely

Add to Reading List

Source URL: www.devonshires.com

Language: English - Date: 2014-02-24 11:09:44
873The Bugle / Christmas music / Christmas worldwide / New Zealand Distinguished Service Decoration / New Zealand / Antarctica / Christmas / Physical geography / Political geography

Issue 205 | January 2015  Kiwi Christmas in Sinai The Beauty in Antarctica RSA Christmas Packages  Keeping the Home Fires Burning

Add to Reading List

Source URL: homebase.mil.nz

Language: English - Date: 2015-01-15 15:58:45
874Electronic commerce / Cryptographic protocols / SAS / Digital signature / Public key certificate / X.509 / Man-in-the-middle attack / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management

Experimenting with Server-Aided Signatures Xuhua Ding, Daniele Mazzocchi, Gene Tsudik Information and Computer Science Department University of California, Irvine {xhding,dmazzocc,gts}@ics.uci.edu

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:20:50
875Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
876RAID / Information science / Standard RAID levels / Hard disk drive / Error detection and correction / Disk storage / Disk sector / Disk formatting / Backup / Computer hardware / Computer storage media / Computing

A Clean-Slate Look at Disk Scrubbing Alina Oprea RSA Laboratories Cambridge, MA

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-01-14 15:44:19
877One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
878Integer factorization algorithms / RSA numbers / Public-key cryptography / Electronic commerce / RSA

Africa Level 4 Competitor Listing By Family Name Printed February 16, 2015 at 8:44 No. Name

Add to Reading List

Source URL: www.ipscmatches.org

Language: English - Date: 2015-02-16 01:47:05
879Oracle machine / Alice and Bob / XTR / Advantage / RSA / Probability space / Cryptography / Cryptographic protocols / Random oracle

Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:50:52
880Modular arithmetic / Public-key cryptography / Quadratic residue / Commutative algebra / Rabin cryptosystem / RSA / Blum integer / Modulo operation / Legendre symbol / Abstract algebra / Mathematics / Cryptography

Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 08:08:37
UPDATE