<--- Back to Details
First PageDocument Content
National security / Trade secrets / Secrecy / Computer security / Intellectual rights to magic methods / Patent / Information security / Japanese trade secrets / Anti-Counterfeiting Trade Agreement / Intellectual property law / Security / Crime prevention
Date: 2015-03-18 01:56:36
National security
Trade secrets
Secrecy
Computer security
Intellectual rights to magic methods
Patent
Information security
Japanese trade secrets
Anti-Counterfeiting Trade Agreement
Intellectual property law
Security
Crime prevention

<4D6963726F736F667420576F7264202D208179313530333138926D8DE08EBA8F4390B38CE3835A83628367817A8B5A8F7097AC8F6F96688E7E8D7393AE90E98CBE8169967B95B6816A2E646F6378>

Add to Reading List

Source URL: www.meti.go.jp

Download Document from Source Website

File Size: 92,32 KB

Share Document on Facebook

Similar Documents

Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

DocID: 1xV9y - View Document

Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document

Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xUSb - View Document

Theoretical computer science / Quantum information science / Emerging technologies / Physics / Quantum cryptography / Quantum mechanics / Quantum computing / Quantum technology / Quantum information / Quantum network / Pittsburgh Quantum Institute

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

DocID: 1xTWc - View Document

Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

DocID: 1xT8l - View Document