Data Encryption Standard

Results: 514



#Item
261Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
262Computing / Cryptographic software / Antivirus software / ESET NOD32 / ESET / Advanced Encryption Standard / Data security / USB flash drive / Encrypting File System / Disk encryption / Cryptography / Software

DESlock+ Compliance Guide Protect your data Health Insurance Portability and Accountability (HIPAA). This act was enacted by the United States Congress in 1996 and as of September 23, 2013,

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
263Software / System software / ESET NOD32 / ESET / Advanced Encryption Standard / Filesystem-level encryption / Data security / Encrypting File System / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
264National Security Agency / Key size / Symmetric-key algorithm / Triple DES / Project 25 / Wireless security / Secure voice / Strong cryptography / Key Wrap / Cryptography / Data Encryption Standard / Advanced Encryption Standard

DHS Office of Emergency Communications Guidelines for Encryption in Land Mobile Radio Systems September 2013

Add to Reading List

Source URL: www.azpsic.gov

Language: English - Date: 2013-10-02 16:37:55
265Computing / Cryptography / Internet / Computer security / Email encryption / Information security / Encryption / Echoworx / Secure messaging / Email / Security / Internet privacy

Success Story Banking on Zix Corporation for Secure Email ZixCorp® Email Encryption Services are the gold standard for securing financial data in email

Add to Reading List

Source URL: www.zixcorp.com

Language: English
266Blowfish / Symmetric-key algorithm / KHAZAD / Block size / Square / Cipher / Advanced Encryption Standard / Data Encryption Standard / MARS / Cryptography / Block ciphers / Twofish

Programming with GNU Crypto Version 2.0.0, 9 November 2003 Casey Marshall Raif S. Naffah

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2003-11-08 19:11:09
267Key schedule / ICE / Block cipher / FEAL / Cryptanalysis / VEST / Piling-up lemma / Differential-linear attack / Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Improved Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh1 , Hoda A. Alkhzaimi2 , Mohammad Reza Aref1 , Nasour Bagheri3 , Praveen Gauravaram4 , and Martin M. Lauridsen2 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-31 06:20:57
268Field-programmable gate array / Advanced Encryption Standard / Lookup table / Data Encryption Standard / ICE / Block cipher / S-box / Xilinx / Bitstream / Cryptography / Computing / Reconfigurable computing

1 FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, and Christof Paar, Fellow, IEEE Horst G¨ortz Institute for IT Security, Ruhr University Bochum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 14:41:24
269Software / Computing / ESET / Payment Card Industry Data Security Standard / Data security / Advanced Encryption Standard / USB flash drive / Filesystem-level encryption / Transparent Data Encryption / Disk encryption / Cryptography / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
270Cryptographic software / Computing / Antivirus software / ESET NOD32 / ESET / Data security / Advanced Encryption Standard / Encryption / BitLocker Drive Encryption / Cryptography / Disk encryption / Software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
UPDATE