Cipher disk

Results: 82



#Item
21Cipher / Surveillance / Regulation of Investigatory Powers Act / Encryption / Internet privacy / Criminal law / Disk encryption / Export of cryptography in the United States / Network Security & Cryptography / Cryptography / Computer law / Law

LC Paper No. CB[removed]) Comment and recommendation to the Inter-departmental Working Group on Computer Related Crime Report By

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-08-10 22:43:04
22Cipher / Symmetric-key algorithm / Data security / Disk encryption / Cryptography / Cryptographic software / Public-key cryptography

Brochure_VMEOffice_New2adjusted

Add to Reading List

Source URL: meganet.com

Language: English - Date: 2014-10-24 18:01:28
23Key management / Encryption software / Encryption / Public-key cryptography / Symmetric-key algorithm / Key size / Advanced Encryption Standard / Cipher / Cryptography / Cryptographic software / Disk encryption

Information Security Animations – Data Encryption (Script) Data Encryption Data Encryption means converting some easily readable information into a set of texts that appears unintelligible and not readily understandab

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:10
24Key management / Encryption software / Encryption / Public-key cryptography / Symmetric-key algorithm / Key size / Advanced Encryption Standard / Cipher / Cryptography / Cryptographic software / Disk encryption

Information Security Animations – Data Encryption (Script) Data Encryption Data Encryption means converting some easily readable information into a set of texts that appears unintelligible and not readily understandab

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
25Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
26USB / Finite fields / Kingston Technology / Block cipher / USB flash drive / Elliptic curve cryptography / Comparison of encrypted external drives / Aloaha / Cryptography / Disk encryption / Advanced Encryption Standard

Header_Graphic_DataTraveler111

Add to Reading List

Source URL: www.kingston.com

Language: English - Date: 2014-12-03 18:45:56
27Cryptographic software / IEEE P1619 / Block cipher modes of operation / Symmetric-key algorithm / Block cipher / Advanced Encryption Standard / Key / Initialization vector / NSA Suite B Cryptography / Cryptography / Disk encryption / Key management

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
28Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:12:18
29Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
30Classical cipher / Known-plaintext attack / Vigenère cipher / Alberti cipher disk / Cryptography / Cipher / Substitution cipher

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
UPDATE