Back to Results
First PageMeta Content
FEAL / Silvio Micali / Leftover hash lemma / Cryptanalysis / Differential cryptanalysis / Post-quantum cryptography / Small subgroup confinement attack / Group-based cryptography / Cryptography / Cryptographic protocols / Oblivious transfer


References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American
Add to Reading List

Document Date: 2001-07-17 16:00:00


Open Document

File Size: 341,15 KB

Share Result on Facebook

City

Innyama / Costa Mesa / Boston / New York / Oxford / Kingston / Rome / Inuyama / London / Banjalore / /

Company

MIT Laboratory / IBM / Cipher Systems / Bayer / Prentice-Hall / AT&T / Plenum Press / Digital Equipment Corp. / Oracle / Secure Computer Systems / Clarendon Press / Bernstein / Aegean Park Press / ABA Bank Card / Wireless Local Area Networks / Ameritech / Digital Equipment Corp Systems / SIAM Journal / Cryptographic Systems / IEEE Press / Needham / SubstitutionPermutation Networks / Communications Security ACM Press / Message Proof Systems / MITRE Corp. / MacMillan / /

Country

Italy / Japan / United States / India / /

Event

FDA Phase / /

Facility

Puzzle Palace / Yale University / /

IndustryTerm

Internet Electronic Mail / /

OperatingSystem

Multics / /

Organization

Big Military / United States District Court for the Northern District of California / MIT / National Standards Institute / American Bankers Association / USENIX Association / Yale University / Prototype Public Key Authentication Service / American Mathematical Society / Internet Society / Ameriean Bankers Association / /

Position

D.J. Bernstein / Mathematical Model / " Report MTR-2547 / CDPD Industry Input Coordinator / /

Product

20th Annual Symposium / Signing Contracts / /

ProvinceOrState

New Jersey / New York / California / Ontario / /

PublishedMedium

Scientific American / the Theory of Computing / Physical Review Letters / SIAM Journal on Computing / Mathematics of Computation / Annals of Mathematics / IEEE Transactions on Information Theory / Communications of the ACM / journal of Cryptology / IEEE Communications Magazine / Theory of Computing / /

Technology

Financial Institution Message Encryption / Public Key Cryptography Using Reversible Algorithms / Random Access / Computer Algorithms / Encryption / Data Encryption Algorithm / Cryptography / Public Key / Escrow Encryption / Digital Signature / /

SocialTag