Cryptographic software

Results: 2705



#Item
611Cryptography / System software / Password / USB flash drive / Security token / Ghost / Windows / Encrypting File System / BitLocker Drive Encryption / Disk encryption / Software / Cryptographic software

TM ENTERPRISE EDITION Version 4

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:18:57
612Cryptographic protocols / Cryptographic software / X.509 / Public key certificate / Certificate authority / OpenSSL / GLite / Cryptography / Public-key cryptography / Key management

Grid Tutorial G RID M IDDLEWARE H ANDOUTS FOR

Add to Reading List

Source URL: www.nikhef.nl

Language: English - Date: 2004-09-01 11:30:11
613Search algorithms / Error detection and correction / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
614Security / Computer security / Cryptography / Passphrase / Password / Backup / Remote backup service / Encrypting File System / FileVault / Disk encryption / Cryptographic software / Computing

High Security Online Backup A Cyphertite White Paper February, 2013 Cloud-Based

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
615Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:36:20
616BitLocker Drive Encryption / FileVault / Cold boot attack / Advanced Encryption Standard / TrueCrypt / Dynamic random-access memory / Data remanence / Computer memory / Key / Cryptography / Disk encryption / Cryptographic software

Lest We Remember: Cold-Boot Attacks on Encryption Keys

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2014-12-24 15:14:38
617Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.org

Language: English - Date: 2012-06-05 01:13:02
618Cryptographic software / Disk encryption / Cryptography / Key management / Key

How it works. High Security Online Backup A simple overview of how Cyphertite safely & securely guards your data.

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
619Peer-to-peer computing / Concurrent computing / Transaction processing / Cryptographic hash functions / Error detection and correction / Hashing / Computing / Software / Bitcoin

Accelerating Bitcoin’s Transaction Processing Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky∗ Aviv Zohar†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-31 04:08:51
620XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-09 02:25:32
UPDATE