Who

Results: 137297



#Item
61Ethics / Civil society / Philanthropy / Public administration / Social philosophy / Volunteering / Virtue

[Type text] Job Description: Volunteer Program Manager (VPM) Supervisor: Director of Programs Supervises: Volunteer Coordinator and Volunteers Purpose: Recruit, train, and coach a community of volunteers who are committ

Add to Reading List

Source URL: www.oarnova.org

Language: English - Date: 2018-08-27 09:12:17
62Human behavior / Differential calculus / Art and culture law / Crime / Deception / Forgery / Differential / Learning / Mathematics

Introduction Characteristics Differentials

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
63

A colleague from another part of the organisation who is highly regarded for successfully leading new initiatives is forming a

Add to Reading List

Source URL: europa.eu

Language: French - Date: 2016-12-08 05:13:34
    64Cryptography / Data Encryption Standard / Feistel cipher / Lucifer / MISTY1 / Block cipher / ICE / Tiny Encryption Algorithm

    Introduction Security parameters Fixed-key Feistel & MISTY

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:37
    65Cryptography / Permutation / SIMD / Data Encryption Standard / Feistel cipher / Permutation polynomial / Block cipher

    Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Gaetan.Leurent,Pierre-Alain.France,Charl

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:39
    66Human behavior / Childhood / Abuse / Social work / Child welfare / Child abuse / Child sexual abuse / Child protection / Psychological abuse / Children's rights / National Society for the Prevention of Cruelty to Children / Mandatory reporting in the United States

    For the purpose of this document, a child is defined as anyone who has not yet reached their 18th birthday.  From this point, HackTheMidlands will be referred to as H ​ TM​. This policy applies exclusively to EVENTS

    Add to Reading List

    Source URL: hackthemidlands.co.uk

    Language: English - Date: 2018-10-24 08:00:12
    67Cryptography / Block ciphers / Differential cryptanalysis / Q / Data Encryption Standard / ICE / S-box / ARIA / VEST / NOEKEON / Advanced Encryption Standard / Substitutionpermutation network

    LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Vincent Grosso1 , Ga¨etan Leurent1,2 , Fran¸cois-Xavier Standaert1 , Kerem Varici1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de L

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:36
    68Poultry farming / Agriculture / Chicken hybrids / Engineering vehicles / Broiler / Farmworker / Farm / Skid-steer loader / Settlement geography

    Are you a motivated/organized individual who is looking for an opportunity to grow with a company? Rossdown Farms Ltd. is a rapidly expanding business which hosts a family friendly environment and reliable hours with man

    Add to Reading List

    Source URL: www.rossdown.com

    Language: English - Date: 2018-01-31 17:57:04
    69Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

    Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:36
    70Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

    Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40
    UPDATE