Product and Services Finder

Cryptography

More

Cryptography Research Library

64-Bit Architecture Speeds RSA By 4x
MIPS Technologies, Inc
Public-key cryptography, and RSA in particular, is increasingly important to e-commerce transactions. Many digital consumer appliances (e.g. set-top boxes and smart cards) are now expected to send and receive RSA-encoded messages. Decoding these messages is processing intensive and the ability to do it efficiently offers enormous value. This paper describes how MIPS Technologies achieved a 4x ...
 
Introduction to Encryption
LockLizard
The Shorter Oxford English Dictionary lists the 5th meaning of the word cipher as, “A secret manner of writing by any of various methods, intelligible only to those possessing the key (1528).” Encryption, the use of ciphers, is not new. Far from it. It has been with us for a very long time. I used to say that encryption was traditionally for the four P's. Princes, Popes, Purveyors and Paramours, ...
 
(NIST) Electronic Authentication Guideline
Passfaces Corporation
This recommendation provides technical guidance to Federal agencies implementing electronic authentication. The recommendation covers remote authentication of users over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, authentication protocols and related assertions. KEY WORDS: Authentication, ...
 
Bring-Your-Own-Device (BYOD) Part 2 - Limitations of the Walled Garden
MobileIron
This is the second part in a series designed to help organizations develop their “BYOD” (bring-your-own-device) strategies for personally-owned smartphones and tablets in the enterprise. Chapter 1 of the series, “Building Bring Your Own Device Strategies,” introduced core components of a BYOD program. This chapter compares two technical approaches to BYOD: the walled garden vs. the enterprise ...
 
Build Your Own Device
MobileIron
This is the second part in a series designed to help organizations develop their “BYOD” (bring-your-own-device) strategies for personally-owned smartphones and tablets in the enterprise. Chapter 1 of the series, “Building Bring Your Own Device Strategies,” introduced core components of a BYOD program. This chapter compares two technical approaches to BYOD: the walled garden vs. the enterprise ...
 
SIGN UP FOR OUR
NEWSLETTER
Email
Sign up for our weekly PharmaTech directory newsletter and be the first to know about trending products and services in the lifescience industry.
Cryptography EMD Millipore Bioscience Information

Cryptography Video

Evolve Wipro Wipro helps a leading energy company evolve their business to be future ready
 
IBM, Beware! Wipro Wipro may be the third largest Indian IT company the world over, but it is eyeing the No. 1 spot back at home and has got a brand new strategy to outdo ...
 

PharmaTech Features

Cryptography ATS Labs Pharmaceuticals
Cryptography Union Standard Equipment Company
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.