Advanced Encryption Standard

Results: 1268



#Item
501Password / Email / Internet / Computing / Technology / Advanced Encryption Standard / EMC Corporation / SecurID

(Please write readable blockletters!) To Volkswagen Aktiengesellschaft Key- & Account Management po Box[removed]

Add to Reading List

Source URL: www.seat.ch

Language: English - Date: 2015-01-29 16:08:48
502Password / Security / Computer security / Logical security / Kenneth P. Weiss / Advanced Encryption Standard / EMC Corporation / SecurID

Company Mr/Ms Obligation relating to use of password or a SecurID card An application for user-rights has been made for you, for your work with Volkswagen AG computers. To

Add to Reading List

Source URL: www.seat.ch

Language: English - Date: 2015-01-20 22:09:03
503Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
504Software / System software / ESET NOD32 / ESET / Advanced Encryption Standard / Filesystem-level encryption / Data security / Encrypting File System / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
505Computing / Cryptographic software / Antivirus software / ESET NOD32 / ESET / Advanced Encryption Standard / Data security / USB flash drive / Encrypting File System / Disk encryption / Cryptography / Software

DESlock+ Compliance Guide Protect your data Health Insurance Portability and Accountability (HIPAA). This act was enacted by the United States Congress in 1996 and as of September 23, 2013,

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
506Software / Computing / ESET / Payment Card Industry Data Security Standard / Data security / Advanced Encryption Standard / USB flash drive / Filesystem-level encryption / Transparent Data Encryption / Disk encryption / Cryptography / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
507VEST / Keccak / Radio-frequency identification / Power analysis / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Suit up! Made-to-Measure Hardware Implementations of A SCON Hannes Groß, Erich Wenger, Christoph Dobraunig, and Christoph Ehrenh¨ofer Graz University of Technology, Institute for Applied Information Processing and Comm

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 03:13:44
508VEST / Keccak / Differential cryptanalysis / Q / Advanced Encryption Standard / Cryptography / Stream ciphers / Linear cryptanalysis

Cryptanalysis of Ascon Christoph Dobraunig1 , Maria Eichlseder1 , Florian Mendel1 , and Martin Schl¨affer2 1 IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 17:37:58
509Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
510Advanced Encryption Standard / Key Wrap / Key generation / FIPS 140 / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - 400d - CN16xx-NFBE-SPD-L3-v2.5.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-21 07:02:34
UPDATE