NSA cryptography

Results: 162



#Item
1

Correspondences Regarding Cryptography between John Nash and the NSA∗ February 20, 2012 Abstract In 1955, well-known mathematician John Nash was in correspondence

Add to Reading List

Source URL: web.engr.oregonstate.edu

Language: English - Date: 2012-02-22 13:07:33
    2Software / Cryptography / Computing / Transport Layer Security / Embedded Linux / Freeware / Portable software / Web browsers / Comodo Group / Malware / Phishing / Google Chrome

    16 For 16  16 Things to Know/Try for a Better 2016 by Aaron Grothe Security+/CISSP/NSA IAM/NSA IEM

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2016-02-16 20:40:38
    3Cryptography / Public-key cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / NSA Suite B Cryptography / Cipher suite / OpenSSL / IPsec / SHA-1

    Microsoft PowerPoint - preneel_isse15_v1.pptx

    Add to Reading List

    Source URL: homes.esat.kuleuven.be

    Language: English - Date: 2015-11-15 11:53:49
    4Cryptography / Project 25 / Data Encryption Standard / Advanced Encryption Standard / Cryptographic software / Block ciphers / Disk encryption / NSA encryption systems / FASCINATOR

    The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

    Add to Reading List

    Source URL: www.efjohnson.com

    Language: English - Date: 2011-08-21 12:33:27
    5Cryptography / Security / Cyberwarfare / Military communications / Mass surveillance / National Security Agency / National security / RSA Security / Crypto Wars / Global surveillance disclosures / Communications security / STU-III

    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail accounts and stealing intellectual

    Add to Reading List

    Source URL: jnslp.com

    Language: English - Date: 2015-03-04 13:43:21
    6Oconee County / NSA Suite A Cryptography

    MARKETPLACER ENT /L EASE E MPLOYMENT

    Add to Reading List

    Source URL: theoconeeleader.com

    Language: English - Date: 2015-08-13 04:52:38
    7Cryptography / Cryptographic software / ISO standards / Hardware security module / Smart card / BitLocker / USB / Key / Secure Hash Algorithm / NSA Suite B Cryptography / Elliptic curve cryptography / Rosetta

    PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

    Add to Reading List

    Source URL: www.spyrus.com

    Language: English - Date: 2015-08-05 12:26:38
    8Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

    Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

    Add to Reading List

    Source URL: www.ams.org

    Language: English - Date: 2015-03-10 15:36:10
    9

    Correspondences Regarding Cryptography between John Nash and the NSA∗ February 20, 2012 Abstract In 1955, well-known mathematician John Nash was in correspondence

    Add to Reading List

    Source URL: web.engr.oregonstate.edu

    Language: English - Date: 2012-02-22 13:07:33
      10Mathematics / Applied mathematics / Information theory / Random number generation / Entropy / Modular arithmetic / Key management / Linear congruential generator / Pseudo-ring / Cryptography / Pseudorandom number generators / Randomness

      Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

      Add to Reading List

      Source URL: www.nsa.gov

      Language: English - Date: 2014-07-17 09:45:36
      UPDATE