Key size

Results: 607



#Item
71User interface techniques / Keyboard shortcut / Control key / CTRL / Undo / Ket / Computing / Option key

Balsamiq Mockups Keyboard Shortcuts SELECTION SIZE / POSITION EDIT / HISTORY GROUP

Add to Reading List

Source URL: media.balsamiq.com

Language: English - Date: 2015-12-09 14:58:42
72

Efficient Non‐Malleable Codes and  Key‐derivations against Poly‐size  Tampering Circuits PRATYAY MUKHERJEE  (Aarhus University) Joint work with

Add to Reading List

Source URL: ec14.compute.dtu.dk

Language: English - Date: 2014-05-16 06:28:51
    73Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

    CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-11-08 15:42:56
    74Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

    Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

    Add to Reading List

    Source URL: aaspring.com

    Language: English - Date: 2015-08-21 16:58:21
    75Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

    NIST Special Publication

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-06-10 13:59:58
    76

    Efficient Circuit-Size Independent Public Key Encryption with KDM Security Tal Malkin1 , Isamu Teranishi1,2 , and Moti Yung1,3 1 Columbia University

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2011-02-08 15:43:32
      77Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

      Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

      Add to Reading List

      Source URL: weakdh.org

      Language: English - Date: 2015-10-15 14:53:20
      78

      Sifting problems in finite-size quantum key distribution Extended Abstract Corsin Pfister,1, 2 Patrick J. Coles,3 Stephanie Wehner,1, 2 and Norbert L¨ utkenhaus3 1

      Add to Reading List

      Source URL: 2015.qcrypt.net

      Language: English - Date: 2015-09-22 02:24:15
        79

        Nutrition Facts Key Lime Pie Filling; 21 oz Serving Size 1/3 Cup

        Add to Reading List

        Source URL: www.luckyleaf.com

        - Date: 2016-02-01 14:56:52
          80Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

          The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

          Add to Reading List

          Source URL: www.cs.umd.edu

          Language: English - Date: 2014-06-30 10:38:30
          UPDATE