Search

Your search keyword '"John Kelsey"' showing total 153 results

Search Constraints

Start Over You searched for: Author "John Kelsey" Remove constraint Author: "John Kelsey"
153 results on '"John Kelsey"'

Search Results

62. Prioritising local housing needs through land-use planning in rural areas: Political theatre or amenity protection?

63. Spatio-temporal simulation of energy consumption in China's provinces based on satellite night-time light data

70. Randomness Beacon Format 2.0

71. What can łį́į́’ teach us about decolonizing education?

75. New Second-Preimage Attacks on Hash Functions

76. Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness

77. SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash

78. Introduction

79. Landscaping : The DIY Guide to Planning, Planting, and Building a Better Yard

80. Seth Price: Social Synthetic

81. Field Guide to Tools : How to Identify and Use Virtually Every Tool at the Hardward Store

82. Health and safety maturity in project business cultures

83. On hash functions using checksums

84. Getting Started in Woodturning : 18 Practical Projects & Expert Advice on Safety, Tools & Techniques

85. Technology transfer: international collaboration in Sri Lanka

86. What do construction project planners do?

87. Side channel cryptanalysis of product ciphers

88. Secure audit logs to support computer forensics

89. Remote auditing of software outputs using a trusted coprocessor

90. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

91. Attacking Paper-Based E2E Voting Systems

92. Folklore U.S.

93. Drug interactions. Pending pharma waste regulations

94. Status report on the first round of the SHA-3 cryptographic hash algorithm competition

95. Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård

96. Second Preimage Attacks on Dithered Hash Functions

97. Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work

98. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

99. An authenticated camera

100. Improved Cryptanalysis of Rijndael

Catalog

Books, media, physical & digital resources