John Kelsey

Results: 55



#Item
1Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
2

Efficiency of partner choice and sanctions in Lotus is not altered by nitrogen fertilization rspb.royalsocietypublishing.org John U. Regus1, Kelsey A. Gano1, Amanda C. Hollowell1 and Joel L. Sachs1,2

Add to Reading List

Source URL: www.sachslab.com

Language: English - Date: 2014-02-28 12:10:15
    3

    The Legume-Rhizobium Symbiosis - Ecology - Oxford Bibliographies The  Legume-­Rhizobium  Symbiosis Joel  L.  Sachs,  Kelsey  A.  Gano,  Amanda  C.  Hollowell,  John  U.  Regus

    Add to Reading List

    Source URL: www.sachslab.com

    Language: English - Date: 2013-10-01 20:01:32
      4Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

      Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

      Add to Reading List

      Source URL: www.schneier.com

      Language: English - Date: 2015-12-10 18:36:20
      5

      A&S Senators Fabiani Duarte, freshman Alan Dyer, junior Kelsey Pendleton, freshman A&S Council President John Furlow, sophomorepercent

      Add to Reading List

      Source URL: studentorgs.vanderbilt.edu

      - Date: 2012-03-19 16:18:15
        6

        The Western Bark Beetle Research Group Christopher J. Fettig, Barbara J. Bentz, Nancy E. Gillette, Rick G. Kelsey, John E. Lundquist, Ann M. Lynch, José F. Negrón, Robert A. Progar, Justin B. Runyon, and Steven J. Seyb

        Add to Reading List

        Source URL: fhm.fs.fed.us

        Language: English - Date: 2012-08-28 14:02:37
          7Willard / John Kasich / Isofoton / Ohio / Ted Strickland

          THE TOLEDO BLADE • TOLEDO, OHIO Former Willard & Kelsey executive sought cozy ties with state officials Published: PAGE 1A

          Add to Reading List

          Source URL: www.livawards.org

          Language: English - Date: 2015-04-30 14:46:27
          8Two-man rule / Safety / IEEE 802.1X / Kerberos / Authenticator / Security / Computer network security

          Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor? John Kelsey Bruce Schneier

          Add to Reading List

          Source URL: www.schneier.com

          Language: English - Date: 2014-03-02 23:18:30
          9Public-key cryptography / Grader / Replay attack / Cryptography / Cryptographic protocols / Alice and Bob

          Distributed Proctoring Bruce Schneier ? John Kelsey

          Add to Reading List

          Source URL: www.schneier.com

          Language: English - Date: 2014-03-02 23:18:30
          10Advanced Encryption Standard / Block ciphers / S-box / Weak key / ICE / Differential cryptanalysis / Key size / MARS / Cryptanalysis / Cryptography / Key management / Twofish

          Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

          Add to Reading List

          Source URL: www.schneier.com

          Language: English - Date: 2014-03-02 23:18:31
          UPDATE