Weak key

Results: 101



#Item
1Self-Practice Imitation Learning from Weak Policy Qing Da, Yang Yu, and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China {daq,yuy,zhouzh}@lamda.nju.edu.cn

Self-Practice Imitation Learning from Weak Policy Qing Da, Yang Yu, and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China {daq,yuy,zhouzh}@lamda.nju.edu.cn

Add to Reading List

Source URL: cs.nju.edu.cn

Language: English - Date: 2016-01-04 03:15:09
2Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
3Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
4The Entity-Relationship Unified View of Data PETER PIN-SHAN Massachusetts  Model-Toward

The Entity-Relationship Unified View of Data PETER PIN-SHAN Massachusetts Model-Toward

Add to Reading List

Source URL: www.inf.unibz.it

Language: English - Date: 2010-10-21 02:48:55
5Geophysical Research Letters RESEARCH LETTER2015GL067064 Key Points: • A new population of weak TGFs • TGFs might be a common

Geophysical Research Letters RESEARCH LETTER2015GL067064 Key Points: • A new population of weak TGFs • TGFs might be a common

Add to Reading List

Source URL: wwlln.net

Language: English - Date: 2016-01-03 23:29:38
6Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

Add to Reading List

Source URL: www.informatik.tu-darmstadt.de

Language: English - Date: 2015-05-13 06:54:01
    7Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    8Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

    Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:16
    9UN Photo/Sanniquellie, Liberia  Weak formal legal systems are a key feature of most post-conflict states. In this context, a trade-off is often made in favour of broader restorative forms of justice, over more retributiv

    UN Photo/Sanniquellie, Liberia Weak formal legal systems are a key feature of most post-conflict states. In this context, a trade-off is often made in favour of broader restorative forms of justice, over more retributiv

    Add to Reading List

    Source URL: www.accord.org.za

    - Date: 2014-06-27 04:56:25
      10Random Number Generators: Introduction for Application Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to create

      Random Number Generators: Introduction for Application Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to create

      Add to Reading List

      Source URL: www.nsa.gov

      Language: English - Date: 2014-07-17 09:45:30