Cryptography Research

Results: 540



#Item
531Data deduplication / Data management / Steganographic file system / Crypt / Freenet / Backup / Public-key cryptography / Key size / Secure communication / Cryptography / Disk file systems / Data compression

Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2013-09-11 13:26:16
532Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
533Cryptography standards / Implicit certificate / MQV / SECG / Research In Motion / Elliptic Curve DSA / Key-agreement protocol / Digital signature / ECC patents / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - Certicom secg_patent.dot

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-04-04 11:37:53
534SECG / MQV / Research In Motion / Patent / Key-agreement protocol / ECC patents / Elliptic curve cryptography / Cryptography / Public-key cryptography / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2002-08-09 00:00:00
535Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Digital rights management / Tamper resistance / Ringtone / Copy protection / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:27
536Science / Electronic documents / Electronic lab notebook / Intellectual property law / Computing / Digital signature / Electronic signature / Lab notebook / Portable Document Format / Cryptography / Notebooks / Research

PDF Document

Add to Reading List

Source URL: collaboratory.emsl.pnl.gov

Language: English - Date: 2003-01-17 11:17:15
537Security / Identity management / Identity / Key management / Public-key cryptography / Information Card / Windows CardSpace / Digital identity / Identity theft / Federated identity / Cryptography / Computer security

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2007-05-07 17:16:42
538Spamming / Phishing / Social engineering / Cryptography / Password / PayPal / Internet privacy / Malware / SiteKey / Security / Espionage / Computing

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-12-18 17:40:50
539Markup languages / Technical communication / XML / Cryptography standards / WS-Security / SOAP / HTML element / Root element / Document Type Definition / Computing / Web standards / OSI protocols

PDF Document

Add to Reading List

Source URL: domino.research.ibm.com

Language: English - Date: 2005-08-24 10:11:00
540Key schedule / Grøstl / Stream cipher / Khufu and Khafre / Cryptography / Advanced Encryption Standard / Block cipher

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-08-16 21:37:33
UPDATE