Cipher disk

Results: 82



#Item
41Encryption / Advanced Encryption Standard / Cipher / Backup / Array controller based encryption / IEEE P1619 / Cryptography / Disk encryption / Cryptographic software

Information on Backup Encryption Methods

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:16
42Hard disk drive / Classical cipher / Obfuscated code / Computer hardware / Computer storage media / IBM 305 RAMAC

File Mechanics Disk and Track Selection Disk, Track and Record Arrangement

Add to Reading List

Source URL: www.ed-thelen.org

Language: English - Date: 2008-07-23 04:23:24
43Maryland / Flag signals / Cipher disk / Battle of Antietam / Signal Corps / Antietam Creek / George B. McClellan / Flag / Antietam National Battlefield / Flags / Washington County /  Maryland / Hagerstown Metropolitan Area

Microsoft Word - signal flag lesson plan

Add to Reading List

Source URL: www.nps.gov

Language: English - Date: 2013-05-12 10:31:35
44Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:39:19
45Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

First Modes of Operation Workshop (October[removed]Encryption Modes with Almost Free Message Integrity jutla-auth.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:36:55
46Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:25:51
47Microsoft Windows / System software / Encryption / TrueCrypt / Filesystem-level encryption / IronKey / Cipher / Encrypting File System / On-the-fly encryption / Disk encryption / Cryptographic software / Software

[removed]OUCH-July-Final1-English

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2012-07-19 07:45:42
48Encryption software / Encryption / Cipher / Science / Computer security / Security / Block cipher modes of operation / Network Security & Cryptography / On-the-fly encryption / Cryptography / Cryptographic software / Disk encryption

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Aadarsh Jha

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:11:38
49Data security / Symmetric-key algorithm / CRYPTREC / Encryption software / Information security / Disk encryption / Block cipher / Triple DES / Encryption / Cryptography / Security / Cryptographic software

Guideline on Protection of Personal Information in Telecommunications Business - Efforts with Security Control Measures to Prevent Personal Information Leakage - 1. Main Points of Revised Guideline The Ministry of Intern

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2011-06-27 13:15:06
50Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
UPDATE