Cryptographic software

Results: 2705



#Item
281Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Trusted Platform Module / NTFS / Advanced Encryption Standard / Key generation / Microsoft Windows / Cryptography / Disk encryption

Implementing BitLocker Drive Encryption for Forensic Analysis∗ Jesse D. Kornblum, ManTech International Corporation Abstract

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-02-04 11:20:57
282Email / Software / Cryptographic software / Webmail / Electronic documents / Hushmail / Email client / Tor / Anonymous remailer / Computing / Internet privacy / Internet

Anonymous Anonymous Email Services Smart Card Anonymous Email Services- Do’s and Don’ts 

Add to Reading List

Source URL: www.hurlburt.af.mil

Language: English - Date: 2014-10-16 09:57:41
283Zero-knowledge proof / Soundness / Alice and Bob / Feige–Fiat–Shamir identification scheme / Interactive proof system / Proof of knowledge / Cryptography / Cryptographic protocols / IP

A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
284Password / Cryptographic software / Email / Privileged password management / Password manager / Security / Software / Computer security

WebFaction User Guide Swarma Limited - WebFaction is a service of Swarma Limited CONTENTS

Add to Reading List

Source URL: docs.webfaction.com

Language: English - Date: 2015-05-27 19:09:34
285Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2011-11-01 01:01:06
286Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 14:35:42
287Cryptographic software / Security / Computer security / Public safety / Password / Backup / USB flash drive

School of Education Human Subjects Research Data Security and Storage Guidelines The security of data varies depending on the type of data and the risks associated with breach of data security. In the following chart, th

Add to Reading List

Source URL: www.education.udel.edu

Language: English - Date: 2013-01-22 12:10:56
288Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
289Advantage / Pseudorandom function family / Expected value / Function / Lemmas / Probability theory / Pseudorandom generator / Cryptography / Mathematics / Pseudorandomness

Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1 IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
290Cryptology / Cryptography / ProVerif / Knowledge / Science / Mathematical sciences / Cryptanalysis

Formal Certification of Game-Based Cryptographic Proofs Santiago Zanella B´eguelin IMDEA Software, Madrid, Spain INRIA Sophia Antipolis - M´

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
UPDATE