Secure

Results: 29781



#Item
651Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security

CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-04-06 11:55:20
652

What is secure compilation? Cătălin Hrițcu Inria Paris 1

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2017-01-14 13:09:44
    653

    VIETNAM VETERANS FRIENDLY RETREATS Queensland Standown Park: 91 Radke Road, Kia Ora (halfway between Gympie and Tin Can Bay). Power, water, pets, open fire, showers, toilets, disable facilities, coin laundry, secure off

    Add to Reading List

    Source URL: www.vvaa.org.au

    Language: English - Date: 2017-07-02 21:41:29
      654

      REVISION: This revised directive supersedes **** (Delete this section if not a revised directive)

      Add to Reading List

      Source URL: secure.fedsprotection.com

      Language: English - Date: 2015-10-22 09:18:45
        655

        I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

        Add to Reading List

        Source URL: www.iwsinc.com

        Language: English - Date: 2017-10-18 21:20:11
          656

          Skunk Cabbage NS General Status Rank: Secure naR noitalPLANTS upoP HERBSe:gNON-WOODY

          Add to Reading List

          Source URL: www.speciesatrisk.ca

          Language: English - Date: 2011-04-27 10:25:31
            657

            TRUSTED, VERIFIED AND MORE SECURE ® All .BANK domain names must meet robust security technologies

            Add to Reading List

            Source URL: www.register.bank

            Language: English - Date: 2017-01-19 10:40:46
              658

              Proceedings on Privacy Enhancing Technologies 2015; ):188–205 Peeter Laud* Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning

              Add to Reading List

              Source URL: www.petsymposium.org

              Language: English - Date: 2015-06-23 15:05:18
                659

                Tutorial : The psychology of trading, by Dr John Doyle. Dear Jack, Kudos to You! What a spectacular ride you’ve given us in the last trade. You don’t hear from me very often because I’m a relatively independent tr

                Add to Reading List

                Source URL: secure.cyrusfirst.com

                Language: English - Date: 2006-06-22 18:55:13
                  660

                  ESEYE Integrated Enterprise Communications Router Secure and reliable global communications for your enterprise, machines, systems or remote networks. As a true one-stop shop for large or small scale communications suita

                  Add to Reading List

                  Source URL: www.dataflex.co.uk

                  Language: English - Date: 2014-04-30 10:08:30
                    UPDATE