RSA Security

Results: 682



#Item
1For Release ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid - Protects Utilities from Current and Future Cyber Security Threats ECI will be showcasing its LightSEC solution at RSA 2016 in San Francisco

For Release ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid - Protects Utilities from Current and Future Cyber Security Threats ECI will be showcasing its LightSEC solution at RSA 2016 in San Francisco

Add to Reading List

Source URL: www.ecitele.com

Language: English - Date: 2017-10-08 06:36:50
    2On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

    On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    - Date: 2011-07-10 02:35:14
      3SECURITY INNOVATION  N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

      SECURITY INNOVATION N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

      Add to Reading List

      Source URL: assets.securityinnovation.com

      - Date: 2016-04-21 15:23:27
        4An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan  November 24th, 2015

        An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan November 24th, 2015

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        - Date: 2015-11-22 02:25:22
          5Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

          Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2003-08-29 18:48:12
          6Espionage / Contract law / Backdoor / Cryptography / Rootkits / Spyware / Cyberwarfare / RSA Security / Indemnity / Security

          DOC Document

          Add to Reading List

          Source URL: backdoorbroadcasting.net

          Language: English - Date: 2016-04-06 05:48:09
          7PPAE: Practical Parazoa Authenticated Encryption Family  PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-25 00:46:55
          8  	
   	
     	
   	
  

                     

          Add to Reading List

          Source URL: judiciary.house.gov

          Language: English - Date: 2016-03-10 11:31:32
          9Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

          Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

          Add to Reading List

          Source URL: www.winlab.rutgers.edu

          Language: English - Date: 2011-08-05 21:36:39
          10Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

          Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

          Add to Reading List

          Source URL: www.conlog.co.za

          Language: English - Date: 2015-11-26 07:18:35