Back to Results
First PageMeta Content
Cryptanalysis / Cipher / Symmetric-key algorithm / Block cipher / SHA-1 / NIST hash function competition / Cryptosystem / Transport Layer Security / Lattice-based cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols


IS2: Guidelines for Authors
Add to Reading List

Document Date: 2008-06-09 08:32:09


Open Document

File Size: 144,63 KB

Share Result on Facebook

City

Prague / /

Company

AES / /

Country

United States / Czech Republic / /

/

Event

Product Issues / /

Facility

Charles University / /

IndustryTerm

public network / authentication protocol / internet banking / cryptographic protocols / cryptographic tools / needed and important basic services / metal scrap / encryption device / media news / encryption tools / cryptographic products / cryptographic algorithms / information technologies / little assurance and simple tools / even worldwide used security products / cryptographic services / cryptanalytical services / electronic commerce / /

Movie

Grow your own / /

Organization

Charles University / /

Person

Tomas Rosa / Ondrej Pokorny / Vashek Matyáš / Pavel Vondruška / Daniel Bleichenbacher / /

Position

security manager / /

Product

electronic signatures / /

Technology

encryption / authentication protocol / cryptography / information technologies / standardized algorithm / key exchange protocol / firewall / SSL protocol / company network encryption / operating system / SSL / operating systems / IP protocol / /

URL

http /

SocialTag