Sha

Results: 7306



#Item
831Reservoirs in Hong Kong / Sha Tin District / Pat Heung / Hong Kong / The Hong Kong Federation of Youth Groups / Reservoirs of Hong Kong

Microsoft Word - event.doc

Add to Reading List

Source URL: web.edu.hku.hk

Language: English - Date: 2014-12-02 20:35:54
832Cryptographic software / OpenSSL / SHA-2 / C / D / Computing / Computer programming / Software engineering

LibreSSL Giovanni Bechis Universit´a degli studi di Udine, Nov 29, 2014

Add to Reading List

Source URL: www.snb.it

Language: English - Date: 2014-11-29 12:45:40
833Hong Kong Institute of Vocational Education / Kowloon Station / Sham Shui Po / Index of Hong Kong-related articles / The Scout Association of Hong Kong / Hong Kong / Cheung Sha Wan / Tsim Sha Tsui

TRAIN-THE-TRAINER COURSE 5 full days Train-the-Trainer Course in Cantonese organized by

Add to Reading List

Source URL: www.thehksa.com

Language: English - Date: 2014-03-10 04:04:48
834Kwun Chung / Tung Wah Group of Hospitals / Sha Tin / Sha Tin District / Austin Station / Tin Shui Wai / Index of Hong Kong-related articles / Public housing estates in Tin Shui Wai / Hong Kong / Private housing estates in Hong Kong / Yuen Long District

嚴重殘疾人士護理院Care and Attention Homes for Severely Disabled Persons

Add to Reading List

Source URL: www.swd.gov.hk

Language: English - Date: 2015-03-30 03:03:49
835Economic history / Socioeconomics / Crisis / Financial crisis / Late-2000s financial crisis / SHA-2 / Economics / Economic bubbles / Financial crises

The Financial Bubble Experiment: Advanced Diagnostics and Forecasts of Bubble Terminations Volume III R. Woodard, D. Sornette, J. Berninger (The Financial Crisis Observatory)∗ Department of Management, Technology and E

Add to Reading List

Source URL: www.er.ethz.ch

Language: English - Date: 2011-05-03 11:07:32
836Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
837Secure communication / Internet protocols / Cryptographic protocols / System software / Internet standards / Transport Layer Security / Cipher suite / OpenSSL / SHA-2 / Software / Cryptographic software / Computing

SSLデフォルト設定の調査 - サーバ編 - 付録1 Cipher Suite

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-08-05 01:02:35
838SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
839Qualifications / Hong Kong Institute of Vocational Education / Sha Tin / Higher diploma / Diploma / Caritas Institute of Higher Education / Index of Hong Kong-related articles / Caritas Hong Kong / Education / Hong Kong / Education in Hong Kong

Microsoft Word - HKIAAT Scholarship recipientsdoc

Add to Reading List

Source URL: www.hkiaat.org

Language: English - Date: 2009-08-06 05:57:24
840

  2014年6月18日    S/MIME 証明書の SHA­1 ハッシュアルゴリズム利用終了に伴う 

Add to Reading List

Source URL: sas.hde.co.jp

Language: Japanese - Date: 2014-06-17 21:54:38
    UPDATE