256

Results: 1403



#Item
181

August 2014 VOL XXII, Issue 8, Number 256 Editor: Klaus J. Gerken European Editor: Mois Benarroch Contributing Editors: Jack R. Wesdorp Previous Associate Editors: Igal Koshevoy; Evan Light; Pedro Sena; Oswald Le Winter;

Add to Reading List

Source URL: users.synapse.net

Language: English - Date: 2014-08-02 03:43:32
    182

    READY Secure USB 3.0 Portable Hard Drive With real-time XTS-AES 256-bit hardware encryption, software free design and a super speed USB 3.0 connection, the perfect blend of security, durability

    Add to Reading List

    Source URL: www.istorage-uk.com

    Language: English - Date: 2015-08-10 08:35:57
      183

      GRADUATE HANDBOOK DEPARTMENT OF HISTORY 506 E. Circle Dr. Room 256 Old Horticulture MICHIGAN STATE UNIVERSITY

      Add to Reading List

      Source URL: history.msu.edu

      Language: English - Date: 2015-08-10 14:50:48
        184

        Dr. Benjamin Goldberg HUMMWF 11:50-12:40 (CPRMWF 12:55-1:45 (CPRMWF 10:45-11:35 (CPR 256)

        Add to Reading List

        Source URL: metabenny.com

        Language: English - Date: 2013-09-15 09:17:31
          185Software engineering / Programming language theory / Theoretical computer science / C++ / Logic in computer science / Proof assistants / Data types / SHA-2 / Formal verification / Separation logic / Coq / Functional programming

          Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

          Add to Reading List

          Source URL: www.cs.princeton.edu

          Language: English - Date: 2014-12-23 10:16:22
          186

          Pearl #256 A Notice to Religious People A Notice to Religious People “See, I am coming soon; my reward is with me, to repay according to everyone’s work. I am the Alpha and the Omega, the first and the last, the beg

          Add to Reading List

          Source URL: www.apocalypse2008-2015.com

          Language: English - Date: 2014-12-29 19:24:23
            187Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

            Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

            Add to Reading List

            Source URL: www.hyperelliptic.org

            Language: English - Date: 2008-09-27 14:59:29
            188

            001-256_5511_1A_EGN_MEINE_TASSEN_IM_SCHRANK.IND8

            Add to Reading List

            Source URL: www.egmont-vg.de

            Language: German - Date: 2015-08-03 08:01:16
              189

              Typografie 256 • »Typography exists to honor content.« (Robert Bringhurst)

              Add to Reading List

              Source URL: www.mathematik.uni-ulm.de

              Language: German - Date: 2014-06-18 06:00:08
                190

                Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Graz University of Technology, Austria Abstract. The hash function Kupyna was recentl

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-10-01 11:25:53
                  UPDATE