"RSA" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 16 of 50 - About 500 Essays
  • Good Essays

    key sizes for the same security level w.r.t. applications in finite fields Zr. Yet‚ except for weaker types of curves like ’anomalous’[47‚48]or ’supersingular’ curves‚ 160- bit elliptic curve public keys provide about the same security as a 1024-bit RSA

    Premium Statistics Normal distribution Chemistry

    • 1161 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Media Culture Power

    • 2284 Words
    • 10 Pages

    Discuss how notions of communication and culture are understood within the liberal democratic‚ Althusserian and ‘governmental’ theoretical paradigms. The living of people can be considered as one of the hardest issues to study in the world. In the development of the society‚ new products and ideas were invented and produced purposely to improve the living standard of the people which also impacted their livings in the same time. Thus‚ sociologists came out with their social theories or approaches

    Free Sociology

    • 2284 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Matrix Essay

    • 1344 Words
    • 6 Pages

    Paradoxical Hero In the movie The Matrix‚ the main character‚ Neo or Mr. Anderson‚ is liberated from his role as a slave to sentient machines by Morpheus‚ Neo’s supporter and leader‚ who later tells him the truth that‚ “the Matrix is everywhere”‚ functioning like an ideology. Morpheus tells Neo that‚ The Matrix is a system‚ Neo. That system is our enemy. But when you ’re inside‚ you look around‚ what do you see? Businessmen‚ teachers‚ lawyers‚ carpenters. The very minds of the people we

    Premium The Matrix Karl Marx Ideology

    • 1344 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cyber Espionage

    • 4042 Words
    • 17 Pages

    Cyber Espionage In India Cyber espionage is an area that has recently attracted the attentions of Indian government and corporate houses alike. Both Indian government and corporate houses are the biggest loosers from cyber espionage. Sensitive information on national security and trade secrets and commercial information has been occasionally stolen through cyber espionage in India. India has been a victim of cyber espionage on many occasions where crackers operating in foreign jurisdictions

    Premium Computer security Computer Security

    • 4042 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    Marxism (Sociology)

    • 2198 Words
    • 9 Pages

    AQA AS/A SOCIOLOGY ESSAY: CRITICALLY EXAMINE MARXIST PERSPECTIVES ON TODAY’S SOCIETY Classical Marxism is a conflict structural theory which argues that‚ rather than society being based on value consensus as functionalists would contend‚ there is a conflict of interest between different groups (social classes) because of the unequal distribution of power and wealth. Marxists are also interested in the way in which social change can occur‚ particularly in sudden and revolutionary ways. However‚ there

    Premium Marxism Sociology

    • 2198 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Sms Project

    • 5180 Words
    • 21 Pages

    SMS encryption using Diife-Hellman May 4‚ 2012 Introduction 1.1 Background Nowadays mobile phone communications (phone calls) are used mostly by everyone due to the GSM technology. In mobile phones there are several services a person can use to communicate other than making a phone call such as; SMS‚ MMS‚ contact registry and cameras. The most commonly used service after phone calls is the SMS that most of us find it easier even faster to share or to communicate with one another. An SMS

    Premium Encryption Mobile phone Cryptography

    • 5180 Words
    • 21 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message. 9. Complexity‚ cost‚ lack of scalability‚ and lack of interoperability with VoIP systems. 10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.

    Free Cryptography Pretty Good Privacy Public key infrastructure

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    University of Leeds

    • 4884 Words
    • 16 Pages

    Introduction Monitoring of attendance is recognised as an important element in supporting both student retention and performance. Regular and appropriate attendance has been a University requirement for many years as stipulated in the Curricular Ordinances and Regulations1 http://www.leeds.ac.uk/calendar/ordinances.htm For taught students‚ failure to attend and/or absence without permission can result in serious consequences for the student through the Unsatisfactory Student Procedure. The Graduate

    Premium School Student International student

    • 4884 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    EBU 4008 Module: Supply Chain Strategy Assignment: Strategy Development Report Student No.: 1110434 Submitted in partial fulfillment of the requirement for the degree of MSc in Logistics and Supply Chain Management. University of Bolton Contents 1. Introduction 4 2. Structure of the report 4 3. Organization and supply chain background 5 4. Review of Business Strategy 5 4.1 Market Penetration 5 4.2 Strategic alliances 6 4.3 SPAR: expansion and growth. 6 4.4 System

    Premium Supply chain management Strategic management Supply chain

    • 4223 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    risk management report

    • 1155 Words
    • 5 Pages

    Risk management report Case study --A small dine-in restaurant located at Chinatown Introduction Our restaurant is located in Chinatown‚ it is owned by a Chinese family. It now hires 1 full-time and 4 casual waiters‚ the restaurant normally has 2-3 waiters during week days and 4 during weekends. It also has 1 kitchen hand and two cook. The stakeholder of this particular business would be Chinatown council (community)‚ employees‚ customers‚ suppliers‚ government

    Premium Hygiene Risk management Risk

    • 1155 Words
    • 5 Pages
    Good Essays
Page 1 13 14 15 16 17 18 19 20 50