Who

Results: 137297



#Item
61[Type text]  Job Description: Volunteer Program Manager (VPM) Supervisor: Director of Programs Supervises: Volunteer Coordinator and Volunteers Purpose: Recruit, train, and coach a community of volunteers who are committ

[Type text] Job Description: Volunteer Program Manager (VPM) Supervisor: Director of Programs Supervises: Volunteer Coordinator and Volunteers Purpose: Recruit, train, and coach a community of volunteers who are committ

Add to Reading List

Source URL: www.oarnova.org

Language: English - Date: 2018-08-27 09:12:17
62Introduction  Characteristics Differentials

Introduction Characteristics Differentials

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
63A colleague from another part of the organisation who is highly regarded for successfully leading new initiatives is forming a

A colleague from another part of the organisation who is highly regarded for successfully leading new initiatives is forming a

Add to Reading List

Source URL: europa.eu

Language: French - Date: 2016-12-08 05:13:34
    64Introduction  Security parameters Fixed-key Feistel & MISTY

    Introduction Security parameters Fixed-key Feistel & MISTY

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:37
    65Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Gaetan.Leurent,Pierre-Alain.France,Charl

    Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Gaetan.Leurent,Pierre-Alain.France,Charl

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:39
    66For the purpose of this document, a child is defined as anyone who has not yet reached their 18th birthday.  From this point, HackTheMidlands will be referred to as H ​ TM​. This policy applies exclusively to EVENTS

    For the purpose of this document, a child is defined as anyone who has not yet reached their 18th birthday.  From this point, HackTheMidlands will be referred to as H ​ TM​. This policy applies exclusively to EVENTS

    Add to Reading List

    Source URL: hackthemidlands.co.uk

    Language: English - Date: 2018-10-24 08:00:12
    67LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Vincent Grosso1 , Ga¨etan Leurent1,2 , Fran¸cois-Xavier Standaert1 , Kerem Varici1 1  ICTEAM/ELEN/Crypto Group, Universit´e catholique de L

    LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Vincent Grosso1 , Ga¨etan Leurent1,2 , Fran¸cois-Xavier Standaert1 , Kerem Varici1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de L

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:36
    68Are you a motivated/organized individual who is looking for an opportunity to grow with a company? Rossdown Farms Ltd. is a rapidly expanding business which hosts a family friendly environment and reliable hours with man

    Are you a motivated/organized individual who is looking for an opportunity to grow with a company? Rossdown Farms Ltd. is a rapidly expanding business which hosts a family friendly environment and reliable hours with man

    Add to Reading List

    Source URL: www.rossdown.com

    Language: English - Date: 2018-01-31 17:57:04
    69Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1  ANSSI, France

    Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:36
    70Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group   Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

    Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40