Block cipher mode of operation

Results: 110



#Item
11Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1  Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
12Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1  Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
13International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
14Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
15FIPSValidation Process*  FIPSSections and Security Levels Security Levels  Sections

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
16NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
17Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24
18Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
19Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34
20ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-14 13:47:17