RSA

Results: 5605



#Item
131Cryptography / Computer access control / Signature / Computer law / E-commerce / Cryptography standards / Authentication / Biometrics / Electronic signature / RSA SecurID / Public key certificate / Qualified electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
132Education / Examination boards in the United Kingdom / Secondary education in England / Secondary education in Wales / Edexcel / Assessment and Qualifications Alliance / General Certificate of Secondary Education / GCE Advanced Level / Human migration / Oxford /  Cambridge and RSA Examinations / Advanced Extension Award

How does migration fit into the curriculumat Primary? ...at KS3? ...at GCSE?

Add to Reading List

Source URL: geography.org.uk

Language: English
133Cryptography / Modular arithmetic / Zero-knowledge proof / Quadratic residue / RSA / FeigeFiatShamir identification scheme / IP / Public-key cryptography

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
134Cryptography / Dell / RSA Security / Regional Studies Association / RSA Conference / Royal Society of Arts / RSA / Funding of science

REGIONAL STUDIES ASSOCIATIONResearch Networks Handbook CONTENTS I.

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2016-07-21 09:04:37
135Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
136Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
137

Pêche en eau trouble RSA: le phishing en quête de diversification BS7799, les cordonniers mal chaussés bilisation particulièrement forte de l’autre côté de la

Add to Reading List

Source URL: www.cnis-mag.com

Language: French - Date: 2009-06-30 06:26:26
    138Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    139Cryptography / Mix network / RSA / Cryptanalysis / Cipher

    Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Bj¨orn Terelius, Douglas Wikstr¨om, February 24, 2012

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 09:04:28
    140Economy / Finance / Types of insurance / Financial institutions / Pets / Money / Insurance / Pet / Liverpool Victoria / More Than / RSA Insurance Group

    Name Address 1 Address 2 Address 3 Address 4 Postcode Go Compare Pet Insurance Imperial House Imperial Way Newport Gwent NP10 8UH More Than Pet Insurance Royal & Sun Alliance Insurance plc PO BOX 15769 Birmingham B2 2RA

    Add to Reading List

    Source URL: www.petwelfarealliance.org

    Language: English - Date: 2014-02-14 05:02:36
    UPDATE