XTR

Results: 836



#Item
641Emacs / Gnus / Base64 / XTR / Summation / Software / Computing / Free software

Gnus 5.11 Reference Card g M-g j m

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2013-08-11 22:24:49
642Shin splints / XTR / Education reform / Special education / Mathematical anxiety / Education / Educational psychology / Mathematics education

A Family Guide to Math in a Multi-Tier System of Supports (MTSS) Introduction It is the job of Kansas educators to help every child in our state—your child—meet high standards for success. MTSS, the

Add to Reading List

Source URL: www.kpirc.org

Language: English - Date: 2013-02-04 09:36:22
643Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:48:24
644Finite fields / Cryptographic protocols / Diffie–Hellman problem / Trapdoor function / Hellman / XTR / CDH / Diffie–Hellman key exchange / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
645Finite fields / Advanced Encryption Standard / Galois/Counter Mode / Block cipher / Authenticated encryption / NSA Suite B Cryptography / Poly1305-AES / XTR / Transport Layer Security / Cryptography / Message authentication codes / Block cipher modes of operation

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
646Protocols / Model checking / IP / Abstraction / XTR / Static single assignment form / Software engineering / Computing / Communications protocol / Data transmission

Microsoft PowerPoint - figs.ppt [Read-Only]

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2008-11-16 00:00:00
647XTR / FO / Boolean algebra / Propositional calculus / Mass point geometry / Theoretical computer science / Mathematical logic / Mathematics

Dear Parents, Shiloh Elementary is excited to share a way to help avoid the summer slide in math skills. Bedtimemath.org is a website that provides a daily math problem at three different levels. You may access the site

Add to Reading List

Source URL: www.shilohes.org

Language: English - Date: 2014-05-23 14:26:34
648Electoral systems / Social choice theory / Elections / Voting system / Diffie–Hellman key exchange / Electronic voting / Voting / XTR / Sociology / Cryptographic protocols / Politics / Psephology

A Fair and Robust Voting System by Broadcast No Author Given No Institute Given Abstract. In 2010, Hao, Ryan & Zieli´ nski proposed a two-round decentralized voting protocol that is efficient in terms of rounds, computa

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-06-15 11:47:16
649Electronic commerce / Finite fields / Key size / RSA / Key / Brute-force attack / XTR / Cryptanalysis / Quantum computer / Cryptography / Public-key cryptography / Key management

Selecting Cryptographic Key Sizes Arjen K. Lenstra1 , Eric R. Verheul2 1 Citibank, N.A., and Technische Universiteit Eindhoven, 1 North Gate Road, Mendham, NJ[removed], U.S.A.,

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2003-06-05 07:41:02
650MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
UPDATE