Concrete security

Results: 79



#Item
11An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-10-31 17:44:37
12SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
13Introduction to Modern Cryptography  Mihir Bellare1 Phillip Rogaway2

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
14Security Engineered Machinery WESTBORO, MA, () * WASHINGTON, DC * SACRAMENTO, CA * SAVANNAH, GA * PHOENIX, AZ SEM ModelDISINTEGRATOR VALUE

Security Engineered Machinery WESTBORO, MA, () * WASHINGTON, DC * SACRAMENTO, CA * SAVANNAH, GA * PHOENIX, AZ SEM ModelDISINTEGRATOR VALUE

Add to Reading List

Source URL: www.semshred.com

Language: English - Date: 2010-04-01 09:19:56
15Security Engineered Machinery WESTBORO, MA, () * WASHINGTON, DC * SACRAMENTO, CA * SAVANNAH, GA * PHOENIX, AZ SEM ModelDISINTEGRATOR VALUE

Security Engineered Machinery WESTBORO, MA, () * WASHINGTON, DC * SACRAMENTO, CA * SAVANNAH, GA * PHOENIX, AZ SEM ModelDISINTEGRATOR VALUE

Add to Reading List

Source URL: www.semshred.com

Language: English - Date: 2010-04-01 09:18:31
16Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-01-25 08:24:32
17M E DI A  RE LE A S E 11 JulyWorkSafe foreshadows an audit and puts two concrete

M E DI A RE LE A S E 11 JulyWorkSafe foreshadows an audit and puts two concrete

Add to Reading List

Source URL: cdn.justice.act.gov.au

Language: English - Date: 2014-07-10 22:50:39
18Repertoire of the Practice of the Security Council, [removed]Urged the parties to take concrete steps to implement immediately and without preconditions the delimitation decision of the Boundary Commission, taking into

Repertoire of the Practice of the Security Council, [removed]Urged the parties to take concrete steps to implement immediately and without preconditions the delimitation decision of the Boundary Commission, taking into

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2014-06-27 17:24:49
19MATERIAL SAFETY DATA SHEET Issued[removed]Code: Amber Product Name: Macrofix

MATERIAL SAFETY DATA SHEET Issued[removed]Code: Amber Product Name: Macrofix

Add to Reading List

Source URL: www.constructionchemicals.com.au

Language: English - Date: 2015-03-18 20:54:15
20MATERIAL SAFETY DATA SHEET  Issued[removed]Code: Amber  IDENTIFICATION

MATERIAL SAFETY DATA SHEET Issued[removed]Code: Amber IDENTIFICATION

Add to Reading List

Source URL: www.constructionchemicals.com.au

Language: English - Date: 2014-09-23 23:36:56