Standard model

Results: 3106



#Item
631Cryptographic hash functions / Computability theory / Random oracle / Oracle machine / Oracle Corporation / Proof of knowledge / L / Standard model / Oracle Database / Cryptography / Theoretical computer science / Cryptographic protocols

Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-18 23:51:34
632

Standard-vedligeholdelsesreglement Rasmus Raskkollegiet afd. 02 i Kollegieboligselskabet Model A – normalistandsættelse

Add to Reading List

Source URL: www.kollegieboligselskabet.dk

Language: Danish - Date: 2014-05-08 03:46:33
    633Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature

    Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-18 04:58:38
    634Private law / English contract law / Tax reform / Value added tax / Contractual term / Goods and Services Tax / Tax / Contract / Affreightment / Law / Contract law / Legal documents

    AUSTRALIAN FEDERATION OF INTERNATIONAL FORWARDERS Ltd. MODEL STANDARD TRADING CONDITIONS OF CONTRACT

    Add to Reading List

    Source URL: www.deugro.com

    Language: English - Date: 2015-02-13 07:47:22
    635Global warming / Climate forcing / Computational science / Global climate model / Climate / Standard deviation / Uncertainty / Global warming controversy / Special Report on Emissions Scenarios / Statistics / Climate change / Atmospheric sciences

    Uncertainties in projections of climate change Jouni Räisänen Department of Physics, University of Helsinki 14 October 2010

    Add to Reading List

    Source URL: www.baltex-research.eu

    Language: English - Date: 2010-11-01 10:15:47
    636Advantage / Project Nike / ElGamal encryption / Diffie–Hellman key exchange / Ciphertext indistinguishability / Standard model / Random oracle / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Public-key cryptography / Cryptographic protocols

    Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-31 16:38:11
    637Quantum field theory / Supersymmetry / Electroweak theory / Flavour / Yukawa interaction / Superfield / Physics / Particle physics / Standard Model

    ULB, Bruxelles October 12th 2012 Phenomenology of the flavour messenger sector Lorenzo Calibbi

    Add to Reading List

    Source URL: www.ulb.ac.be

    Language: English - Date: 2012-10-16 11:14:59
    638Environmental chemistry / Oxidizing agents / Analytical chemistry / Parts-per notation / SO4 / Ozone / Particulates / Chemistry / Measurement / Pollution

    Documentation on the Boundary Conditions provided by MET Norway to EDIII Trend exercise The boundary conditions (BCs) supplied for the EDIII study are a simplified version of those used in the standard EMEP MSC-W model.

    Add to Reading List

    Source URL: wiki.met.no

    Language: English - Date: 2015-02-25 11:40:34
    639Electroweak theory / Conservation laws / Cabibbo–Kobayashi–Maskawa matrix / Matrices / LHCb / CP violation / Toshihide Maskawa / Flavour / Nicola Cabibbo / Physics / Particle physics / Standard Model

    Результаты эксперимента LHCb Алексей Дзюба / Семинар ОФВЭ 01 октября 2013 г. LHCb precision measurements 7th of October 2013

    Add to Reading List

    Source URL: hepd.pnpi.spb.ru

    Language: English - Date: 2013-10-09 08:55:49
    640Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

    Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-08-30 11:15:58
    UPDATE