Cryptographic software

Results: 2705



#Item
61Cryptographic software / Key management / Internet security / Transport Layer Security / Cryptography / OpenSSL / Heartbleed / SHA-1 / Key / GNU Privacy Guard / Public-key cryptography / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: blu.org

Language: English - Date: 2014-09-17 23:54:20
62Cryptography / Secure communication / Disk encryption / Cryptographic software / Encryption / Data Encryption Standard / Key size / Crypto phone / Secure voice / VeraCrypt / Cryptography standards

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-02-03 15:53:09
63Hypertext Transfer Protocol / Secure communication / Cryptographic protocols / Internet privacy / Cryptographic software / Stunnel / Load balancing / HTTPS / HTTP cookie

ALOHA LOAD BALANCER MANAGING SSL ON THE BACKEND “APPNOTE” #0022 ― MANAGING SSL ON THE BACKEND This application note is intended to help you implement SSL management on the backend (to encrypt data before connecting

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
64Public-key cryptography / Public key infrastructure / Cryptographic software / Key management / PGP / Gpg4win / Public key certificate / Double-click

Configuration of GNU Privacy Guard With Microsoft Outlook 2007 for Sending CTR/STR to CAFIU I. How to install and use Gnu Privacy Guard (Gpg4win) a. Install Gpg4Win - Double click on gpg4winexe

Add to Reading List

Source URL: www.nbc.org.kh

Language: English - Date: 2012-12-19 04:24:34
65Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
66Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
67Windows Vista / Cryptographic software / Data security / Folder lock / File Explorer

Microsoft Word - Configuring JHBox for secure sharing

Add to Reading List

Source URL: www.it.johnshopkins.edu

Language: English
68Cryptographic software / Smalltalk / OpenSSL / Copyright law of the United States / DEFLATE

9th Smalltalks - Argentine Conference University of Buenos Aires November, 2015 VA Smalltalk Update John O’Keefe

Add to Reading List

Source URL: www.instantiations.com

Language: English - Date: 2015-11-30 15:00:51
69Data Encryption Standard / Key size / Cryptographic protocols / Cryptographic software / Disk encryption / Index of cryptography articles / IPsec

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-10-15 13:48:57
70Cross-platform software / Cryptographic software / Discontinued software / Disk encryption / TrueCrypt / PING / Email / Outlook.com

Click  Collec)on  System  Dataset  Request  Form Please  use  this  form  when  reques2ng  a  copy  of  the  Click  Collec2on  System  Dataset  from  the  IU

Add to Reading List

Source URL: carl.cs.indiana.edu

Language: English - Date: 2013-05-28 14:48:39
UPDATE