SHA-2

Results: 893



#Item
191Key management / Public-key cryptography / Precomputation / Hash tree / Post-quantum cryptography / Digital signature / Quantum digital signature / SHA-2 / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 21:36:12
192Sha Tin / Tsuen Wan

PMD-ESTM-FM103-2 To: Promotions Dept. (Ms Jenny Tam) Date:

Add to Reading List

Source URL: www.shatingalleria.com.hk

Language: English - Date: 2015-04-01 00:06:23
193Discount stores / ...instore

ICHM SEMESTER 1, 2015 TEXT BOOK REQUIREMENTS - SHA DEGREE 2ND YEAR CORE + ELECTIVE SUBJECTS Year 2 Core Subjects TEXT

Add to Reading List

Source URL: www.ichm.edu.au

Language: English
194MTR / Transport in Hong Kong / Central /  Hong Kong / Central Station / East Tsim Sha Tsui Station / Tsim Sha Tsui Station / Airport Express / MTR Corporation / Rail transport in Hong Kong / Hong Kong / Subterranea / Tsim Sha Tsui

2 Milestones 2004 January

Add to Reading List

Source URL: mtr.com.hk

Language: English - Date: 2010-07-04 22:47:00
195Business / Crime / Technology / Counterfeit consumer goods / SanDisk / Label / Counterfeit

FAKE SanDisk Ultra Compact Flash Cards Exposed How to identify counterfeit SanDisk Ultra II Compact Flash Cards Clue #1 Front view Genuine has 4 round metal corners inside the black plastic housing. Fake has 2 sha

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 10:54:09
196Hong Kong / Octopus card / Transport in Hong Kong / Parking / K11 / Receipt / Business / Tsim Sha Tsui / Payment systems

TERMS AND CONDITIONS IN RESPECT OF K11 FREE PARKING OFFER 1. Applicable Activity By participating in the activity organized by K11 Concepts Limited (“K11”) as set out in clause 2 below (the

Add to Reading List

Source URL: hk.k11.com

Language: English - Date: 2014-09-23 00:51:40
197

EZweb Specification 【EZweb 全般】SHA-2 対応ケータイアップデートについて -EZweb 仕様書-

Add to Reading List

Source URL: www.au.kddi.com

Language: Japanese - Date: 2015-01-28 06:41:02
    198Tuen Mun / Austin Station / Sha Tin District / Tin Shui Wai / Tai Wai Station / Sheung Shui / West Rail Line / Hong Kong Strategic Route and Exit Number System / New towns of Hong Kong / Hong Kong / MTR / Transport in Hong Kong

    environmental planning and assessment resource materials 2.b For government projects, the policy is that the final versions of Environmental Impact Assessment (EIA)

    Add to Reading List

    Source URL: www.epd.gov.hk

    Language: English - Date: 2004-01-05 08:07:10
    199MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

    Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-08-25 02:24:24
    200FIPS 140 / Advanced Encryption Standard / SHA-2 / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

    Communication & Network Security DigiSAFE TrustCrypt Secure Platform Module

    Add to Reading List

    Source URL: www.digisafe.com

    Language: English - Date: 2014-10-24 02:05:40
    UPDATE