×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [double encryption]
Rsa Algorithm
44 views
From Crypto-Theory to Crypto-Practice 1 CHAPTER 14: From Crypto-Theory to Crypto-Practice SHIFT REGISTERS The first practical approach to ONE-TIME PAD
225 views
SFS Workshop 2012 1 May 21, 2012 SFS Summer Workshop at UT Chattanooga
228 views
SAIL : Secure Anonymised Information Linkage HIRU : Health Information Research Unit Secure Anonymised Information Linkage Databank (SAIL) Martin Heaven,
217 views
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
218 views
Encryption Coursepak little bit in chap 10 of reed
216 views
Understanding Wales: Opportunities for Secondary Data Analysis 16/01/2012, Cardiff University
17 views
Report to the President Big Data and Privacy: A Technological Perspective
36 views
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc. Nathan Keller Bar Ilan University Joint with Itai Dinur,
220 views
Two disparate Examples of of Encryption/Digital Signatures
217 views
Computers and Scientific Thinking David Reed, Creighton University
17 views
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc
41 views
Next >