Cryptographic engineering

Results: 331



#Item
271Cryptographic engineering / Side channel attack / Science / Cryptographic primitive / Algorithmic Number Theory Symposium / Cryptography / Espionage / Workshop on Cryptographic Hardware and Embedded Systems

Workshop on Cryptographic Hardware and Embedded Systems (CHES[removed]sponsored by IACR www.chesworkshop.org

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-02-20 16:50:26
272Cryptographic engineering / Technology / Science / X86 architecture / Intel vPro / Intel / Computer hardware / Cryptography

Intel_Virginia-Tech_software-academy.indd

Add to Reading List

Source URL: software.intel.com

Language: English - Date: 2014-07-02 20:32:11
273Computing / Computer architecture / Reconfigurable computing / Field-programmable gate array / Keccak / Xilinx / Skein / Throughput / Pipeline / NIST hash function competition / Cryptographic hash functions / Electronic engineering

SHA-3 Conference, March 2012, Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:58:04
274Data / Building engineering / Building information modeling / Computer-aided design / Data modeling / American Institute of Architects / Communications protocol / Document / Cryptographic protocol / Construction / Information / Architecture

Guide, Instructions and Commentary to the 2013 AIA Digital Practice Documents AIA Document E203™–2013, Building Information Modeling and Digital Data Exhibit AIA Document G201™–2013, Project Digital Data Protocol

Add to Reading List

Source URL: www.aia.org

Language: English - Date: 2014-04-13 00:42:28
275Cryptographic hash functions / HMAC / MD5 / CyberGraphX / SHA-1 / Operating system / Public-key cryptography / Cryptography / Error detection and correction / Hashing

Information Resource Engineering Inc. CGX Cryptographic Module Security Policy version 1.24 last revision 24 March 2000

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
276FIPS 140-2 / Cryptography / FIPS 140 / Password / Science / Computing / Cryptographic engineering / Cryptography standards / Computer security / Security token

BG5000 Security Policy.book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
277Router / Server appliance / Electronic engineering / Cisco Systems / Network architecture / Network switch / Cisco / Computing / Videotelephony / Networking hardware

Cisco 7206 VXR Router with ISA Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how the 7206 VXR NPE-400 routers meet the security requirements of Federal Information Proces

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
278Network architecture / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Hypertext Transfer Protocol / Transmission Control Protocol / STARTTLS / Computing / Internet / Internet protocols

Internet Engineering Task Force (IETF) Request for Comments: 7301 Category: Standards Track ISSN: [removed]S. Friedl

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-07-11 21:12:57
279Search algorithms / Hashing / Electronic engineering / Digital media / Mobile phone / Cryptographic hash function / Hash function / V Cast / Technology / ITunes / Motorola RAZR

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# [removed]Hashing Techniques for Mobile Device Forensics Shira Danker

Add to Reading List

Source URL: www.ssddfj.org

Language: English - Date: 2013-04-19 15:56:32
280Computer programming / Software engineering / Search algorithms / Spam filtering / Cryptographic hash functions / Bloom filter / Hash function / Type I and type II errors / G factor / Hashing / Computing / Error detection and correction

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
UPDATE