D-block

Results: 551



#Item
131Anonymity / Transaction processing / Computing / Internet privacy / Data management / Software / Bitcoin / Peer-to-peer computing

Decentralized P2P Crypto Currency Transaction Anonymity via Proof of Stake Protocol Extensions By Z, Cloak Technical Services Division , June, 2014 A.D. Abstract BLOCK CHAIN BASED CRYPTO CURRENCIES OF THE BITCOIN 1.0 GEN

Add to Reading List

Source URL: www.cloakcoin.com

Language: English - Date: 2014-11-15 13:57:23
132Gandhinagar / Ahmedabad / States and territories of India / Economy of Gujarat / Gujarat

GUJARAT INTERNATIONAL FINANCE TEC-CITY COMPANY LIMITED GIFTCL, Zonal Facility Centre, Block-12, Road 1-D, Zone-I, GIFT City, Gandhinagar, Gujarat, Pin, India Website : www.giftgujarat.in E-Tender Notice for Invita

Add to Reading List

Source URL: giftgujarat.in

Language: English - Date: 2015-03-12 01:13:39
133Block cipher / Q / Finite fields / XSL attack / Encryption by date / Cryptography / Advanced Encryption Standard / Polynomial

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-20 03:30:14
134Ciphertext / Chosen-plaintext attack / ICE / Cryptanalysis / Stream cipher / Grain / Linear cryptanalysis / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Block cipher

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
135MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
136Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
137Software / Peer-to-peer / Seeks / Information retrieval / Block design / Microsoft Access / Data management / Computing / File sharing networks

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval C.M. Swanson and D.R. Stinson? David C. Cheriton School of Computer Science University of Waterloo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-03 19:40:35
138CPU cache / Cache / Central processing unit / Computer memory / Benchmark / IOzone / Trace / USENIX / IBM General Parallel File System / Computing / Computer hardware / Computer architecture

Extracting Flexible, Replayable Models from Large Block Traces V. Tarasov1 , S. Kumar1 , J. Ma2 , D. Hildebrand3 , A. Povzner3 , G. Kuenning2 , and E. Zadok1 1 Stony Brook University, 2 Harvey Mudd College, and 3 IBM Alm

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2012-01-30 15:25:01
139Ayurveda / Healthcare in India / Traditional medicine / Department of Ayurveda /  Yoga and Naturopathy /  Unani /  Siddha and Homoeopathy / Rasayana / The Ayurvedic Trust / National Research Institute for Panchakarma / Alternative medicine / Medicine / Health

THE RIGHT TO INFORMATION ACTCENTRAL COUNCIL FOR RESEARCH IN AYURVEDA & SIDDHA No.61-65, Institutional Area, Opp. „D‟ Block, Janak Puri, New DelhiTel: , , , , , 2

Add to Reading List

Source URL: ccras.nic.in

Language: English - Date: 2012-12-19 00:55:32
140Government / Legal documents / Public records / Genealogy / Vital statistics / Certified copy / Notary public / Birth certificate / Identity document / Law / Civil law / Notary

Treasury Identity Verification Form Please complete sections B, C, D, E and F in BLOCK LETTERS using black ink. Please note that all fields in each section are mandatory unless specified otherwise. You must attach certif

Add to Reading List

Source URL: www.ruralbank.com.au

Language: English - Date: 2014-07-02 02:09:08
UPDATE