National security

Results: 72580



#Item
1Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
2Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
3Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
4Theoretical computer science / Quantum information science / Emerging technologies / Physics / Quantum cryptography / Quantum mechanics / Quantum computing / Quantum technology / Quantum information / Quantum network / Pittsburgh Quantum Institute

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2018-06-12 17:38:57
5Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
6

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Add to Reading List

Source URL: www.daml.org

Language: English - Date: 2005-04-19 10:56:20
    7

    The National Security Archive The George Washington University Gelman Library, SuiteH Street, N.W. Washington, D.C

    Add to Reading List

    Source URL: nsarchive2.gwu.edu

    Language: English - Date: 2017-08-10 13:59:12
      8

      G:\COMP\INTEL\NATIONAL SECURITY ACT OF 1947.XML NATIONAL SECURITY ACT OFChapter 343; 61 Stat. 496; approved July 26, As Amended Through P.L. 115–118, Enacted January 19, 2018] AN ACT To promote the natio

      Add to Reading List

      Source URL: legcounsel.house.gov

      Language: English - Date: 2018-01-29 12:51:04
        9

        Federal Register / Vol. 83, NoFriday, April 20, Proposed Rules DEPARTMENT OF HOMELAND SECURITY NATIONAL SCIENCE FOUNDATION 45 CFR Part 690

        Add to Reading List

        Source URL: www.gpo.gov

        Language: English - Date: 2018-04-20 00:05:44
          10

          National Aeronautics and Space Administration DATA & APPLICATIONS Agriculture and Food Security Overview

          Add to Reading List

          Source URL: ciesin.columbia.edu

          Language: English - Date: 2017-04-19 15:09:41
            UPDATE