Data Encryption Standard

Results: 514



#Item
231Advanced Encryption Standard / SHARK / Integral cryptanalysis / ICE / Key schedule / Linear cryptanalysis / Differential cryptanalysis / International Data Encryption Algorithm / VEST / Cryptography / Block ciphers / KHAZAD

A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux Cedex, France [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
232Computer security / Crime prevention / National security / Computer network security / Information security / Encryption / Data Encryption Standard / Vulnerability / Plaintext / Security / Cryptography / Cyberwarfare

qry_Cyber Fund_Glossary 21May2014.xlsx

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2014-06-16 15:34:24
233Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
234Software / System software / ESET NOD32 / ESET / Advanced Encryption Standard / Filesystem-level encryption / Data security / Encrypting File System / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
235Computing / Cryptographic software / Antivirus software / ESET NOD32 / ESET / Advanced Encryption Standard / Data security / USB flash drive / Encrypting File System / Disk encryption / Cryptography / Software

DESlock+ Compliance Guide Protect your data Health Insurance Portability and Accountability (HIPAA). This act was enacted by the United States Congress in 1996 and as of September 23, 2013,

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
236Software / Computing / ESET / Payment Card Industry Data Security Standard / Data security / Advanced Encryption Standard / USB flash drive / Filesystem-level encryption / Transparent Data Encryption / Disk encryption / Cryptography / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
237Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
238Clipper chip / Key escrow / Strong cryptography / Key size / Data Encryption Standard / Encryption / Key / Export of cryptography in the United States / Disk encryption / Cryptography / Key management / 56-bit encryption

Encryption Policy Issues Jon M. Peha1 October 1998 Section 1: Introduction Controlling the flow of information in the information age is as important as controlling the

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 1998-10-25 07:50:27
239Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
240Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
UPDATE