Initialization

Results: 404



#Item
101

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
1021 2 Discovery, Configuration, and Initialization (DCI)  3

1 2 Discovery, Configuration, and Initialization (DCI) 3

Add to Reading List

Source URL: www.gs1hk.org

Language: English - Date: 2011-04-27 00:38:33
103Initializer Lists — Alternative
  N2575=N2575=14

Initializer Lists — Alternative N2575=N2575=14

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2008-03-17 06:22:22
104High Assurance Software John Launchbury CEO, Galois Inc   A Personal View

High Assurance Software John Launchbury CEO, Galois Inc A Personal View

Add to Reading List

Source URL: ulf.wiger.net

Language: English - Date: 2008-02-29 09:47:44
105Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
106Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
107Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
1081 The Turing Stream Cipher November 30, 2002  Turing: a fast stream cipher

1 The Turing Stream Cipher November 30, 2002 Turing: a fast stream cipher

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 00:48:29
109COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
110INTERNATIONAL STANDARD ISO/IEC 9899:1999 TECHNICAL CORRIGENDUM 2 PublishedINTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ

INTERNATIONAL STANDARD ISO/IEC 9899:1999 TECHNICAL CORRIGENDUM 2 PublishedINTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2005-03-23 17:55:33