Whitfield Diffie

Results: 59



#Item
31Microsoft Word - Patriot-SPDoc1.10.doc

Microsoft Word - Patriot-SPDoc1.10.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
32RSA BSAFE Crypto-J[removed]Security Policy JCE

RSA BSAFE Crypto-J[removed]Security Policy JCE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
33RSA BSAFE® Crypto-C Micro Edition for Samsung MFP SW Platform (VxWorks) Security Policy Version[removed]December 3, 2012

RSA BSAFE® Crypto-C Micro Edition for Samsung MFP SW Platform (VxWorks) Security Policy Version[removed]December 3, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-03 06:34:12
34Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA[removed][removed]

Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA[removed][removed]

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2014-10-25 12:36:58
35comm-diffie.qxp[removed]:17 AM

comm-diffie.qxp[removed]:17 AM

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2002-03-05 09:53:36
36commentary.qxp[removed]:38 PM Page 461  Commentary In My Opinion  Cryptography in Crisis

commentary.qxp[removed]:38 PM Page 461 Commentary In My Opinion Cryptography in Crisis

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 1999-03-08 15:16:31
37Non-Interactive Key Exchange and Key Assignment Schemes Eduarda Sim˜oes Veloso Freire Thesis submitted to the University of London for the degree of Doctor of Philosophy

Non-Interactive Key Exchange and Key Assignment Schemes Eduarda Sim˜oes Veloso Freire Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-02-04 17:42:47
38Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
39Key Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names and Numbers 10 September 2012

Key Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names and Numbers 10 September 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-11 11:13:56
40New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2004-11-10 12:15:25