Hero

pie_chartSize
Small company
Medium-sized company
mapDistribution
  • 155 search results

  • bookmark_border

    LMP Advisory GmbH

    location_cityMünchen

    workManagement and consultancy services (M70)

    ... of genius and creativity. Our tools are strong cryptography , the blockchain technology and the emerging technologies of the decentralized ...

  • bookmark_border

    Hackmanit GmbH

    location_cityBochum

    workHoldings and financial services (K64)

    ... Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography ; Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky - In Proceedings ...

  • bookmark_border

    EINS-Entwicklung Interaktiver Software GmbH

    location_cityKarlsruhe

    ... Sicherheit in der Informationstechnik: Elliptic Curve Cryptography , TR-03111(2008), http://www.bsi.bund.de/, 7. Juli 2010. [Buc05] Buchanan ...

  • bookmark_border

    finalSoft GmbH

    location_cityBerlin

    workIT (J62)

    ... XUpdate, XSLT, SVG, XML, JDBC, WSDL, JUnit, Java Cryptography Extension, Java Authentication and Authorization Service (JAAS), JFreeCharts ...

  • bookmark_border

    Langer EMV-Technik GmbH

    location_cityBannewitz

    workElectrical engineering (C26)

    ... in Secure Implementations of Pairing-Based Cryptography " Autoren: Goubin L., Fournier J., Jauvart D. "Hardware Trojan Detection ...

  • bookmark_border

    DSI Datensicherheit GmbH

    location_cityStuhr

    workElectrical engineering (C26)

    ... and development of solutions for high-end cryptography , information technologies, advanced communication systems and TEMPEST-hardened ...

  • bookmark_border

    XPS Software GmbH

    location_cityFahrenzhausen

    workWholesale trade (G46)

    ... Verwendung digitaler X.509 Zertifikate. Public Key Cryptography Standards Unter den verschiedenen PKCS#-Kürzeln stellen die RSA-Laboratorien ...

  • bookmark_border

    ESCRYPT GmbH

    location_cityBochum

    workIT (J62)

    ... services Incident Response as a Service Post-quantum cryptography consulting Supplier governance Gebündelte Kompetenzen für den gesamten ...

  • bookmark_border

    Cognizant Mobility GmbH

    location_cityMünchen

    workIT (J62)

    ... von JCE (Java Cryptography Extension) oder PKCS#11 (Publik Key Cryptography Standards).“, kommentiert Sebastian Huber, ...

  • bookmark_border

    CARL von CHIARI GmbH

    location_cityEssen

    workIT (J62)

    ... users using public key cryptography. Public Key Cryptography uses the concept of a keypair. A private key that is stored ...

  • bookmark_border

    Utimaco GmbH

    location_cityAachen

    workWholesale trade (G46)

    ... the right Hardware Security Module (HSM) Post-quantum cryptography : Secure encryption for the quantum age Securing the IoT - OpenVPN ...

  • See twice as many results!

    Register for a free Implisense account to get advanced analysis and more extensive search results.

    account_circleShow more

This website uses cookies to provide this service and improve the user experience. Please select the cookies you wish to accept. You can find further information in our data protection declaration.

Some cookies from this site are necessary for the functionality of this service or enhance the user experience. Since these cookies either do not contain any personal data (e.g. language preference) or are very short-lived (e.g. session ID), cookies from this group are mandatory and cannot be deactivated.
To improve our services, we use user statistics such as Google Analytics, which set cookies for user identification. Google Analytics is a service offered by a third party provider.
To improve our services we use proprietary marketing solutions from third parties. These solutions specifically include Google AdWords and Google Optimize, which each set one or more cookies.
Some cookies from this site are necessary for the functionality of this service or enhance the user experience. Since these cookies either do not contain any personal data (e.g. language preference) or are very short-lived (e.g. session ID), cookies from this group are mandatory and cannot be deactivated.Some cookies from this site are necessary for the functionality of this service or enhance the user experience. Since these cookies either do not contain any personal data (e.g. language preference) or are very short-lived (e.g. session ID), cookies from this group are mandatory and cannot be deactivated.
To improve our services, we use user statistics such as Google Analytics, which set cookies for user identification. Google Analytics is a service offered by a third party provider.Some cookies from this site are necessary for the functionality of this service or enhance the user experience. Since these cookies either do not contain any personal data (e.g. language preference) or are very short-lived (e.g. session ID), cookies from this group are mandatory and cannot be deactivated.
To improve our services we use proprietary marketing solutions from third parties. These solutions specifically include Google AdWords and Google Optimize, which each set one or more cookies.Some cookies from this site are necessary for the functionality of this service or enhance the user experience. Since these cookies either do not contain any personal data (e.g. language preference) or are very short-lived (e.g. session ID), cookies from this group are mandatory and cannot be deactivated.

Save selectionSelect all