Key generator

Results: 91



#Item
71Electromagnetism / Electronic test equipment / Satellite navigation systems / Laboratory equipment / Signal generator / DBm / Phase noise / Pulse-width modulation / Satellite navigation / Electronics / Technology / Oscillators

GPS10eR: 10 MHz Ultra Low Noise Rubidium Frequency Standard (GPSDO). With GPS, GLONASS and Galileo GNSS Satellite Receivers GPS10eR 1U version. There are 1U and 2U versions. The 2U version has more space for options. Key

Add to Reading List

Source URL: www.ptsyst.com

Language: English - Date: 2014-06-13 07:52:21
72Information theory / Key management / Random number generation / Hardware random number generator / Entropy / Pseudorandomness / Key / Cryptographic hash function / MD5 / Cryptography / Randomness / Pseudorandom number generators

R S A L A B O R A T O R I E S B U L L E T I N

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
73Random number generation / Cryptographic hash function / Fortuna / Entropy / Linear feedback shift register / SHA-1 / Hash function / Cryptographically secure pseudorandom number generator / Linear congruential generator / Cryptography / Pseudorandom number generators / Key generation

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
74Pseudorandomness / Pseudorandom generator / Key management / Cryptographic hash function / Mathematics / Computer science / Applied mathematics / Cryptography / Advantage

RZ 3627 (# [removed]Computer Science 18 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:55
75Randomness / Computational complexity theory / Information theory / Pseudorandomness / Hashing / Randomness extractor / Leftover hash lemma / Entropy / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
76Nuclear technology / Electrical generators / Radioisotope thermoelectric generator / General Purpose Heat Source / Multi-Mission Radioisotope Thermoelectric Generator / GPHS-RTG / Stirling radioisotope generator / Ulysses / New Horizons / Spaceflight / Space technology / Spacecraft

20 Radioisotope Power: A Key Technology for Deep Space Exploration

Add to Reading List

Source URL: cdn.intechopen.com

Language: English - Date: 2012-06-29 18:01:03
77Hardware random number generator / Random number generation / Entropy / Pseudorandomness / One-time pad / Key / SHA-1 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

® THE INTEL RANDOM NUMBER GENERATOR

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2010-04-24 19:08:39
78Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
79Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
80Error detection and correction / Key management / Merkle signature scheme / Cryptographic hash function / Digital signature / Hash tree / Key generation / Cryptographically secure pseudorandom number generator / Trie / Cryptography / Public-key cryptography / Hashing

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
UPDATE