Data Encryption Standard

Results: 514



#Item
291Security / Cryptography / Credit cards / Data privacy / Information technology management / Payment Card Industry Data Security Standard / Information security / Encryption / Acquiring bank / Payment systems / Electronic commerce / Business

Microsoft PowerPoint - Securing the Transaction An Overview of Point-to-Point (P2P) Encryption 30-Apr-2014.ppt [Read-Only] [Com

Add to Reading List

Source URL: qa.osc.nc.gov

Language: English - Date: 2014-05-01 15:57:43
292Computer network security / Data security / Public safety / Cyberwarfare / Computer security / Information security / Wireless security / Key size / Encryption / Security / Crime prevention / National security

Section IV: Network Security Title: Encryption Security Standard Current Effective Date: June 30, 2008 Revision History:

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2011-06-14 12:29:43
293PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
294Feistel cipher / Cipher / Block cipher / PLATO / Cryptography / Data Encryption Standard / DEAL

Colloquium Spring[removed]Computer Science Colloquium Seventeenth Series - Spring 2003 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule Adv

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2010-09-07 14:47:13
295Data security / Key management / Encryption software / Cipher / Data Encryption Standard / Block cipher / Encryption / Key size / Information security / Cryptography / Security / Cryptographic software

Encryption Policy Effective Date: December 1, 2007 Policy Statement This policy defines the encryption guidelines and standards for Columbia University. Reason for the Policy This policy provides guidelines to situations

Add to Reading List

Source URL: policylibrary.columbia.edu

Language: English - Date: 2009-10-19 13:52:16
296Public-key cryptography / Internet privacy / Encryption software / Encryption / Email encryption / Data Encryption Standard / Transport Layer Security / Disk encryption / Key size / Cryptography / Email authentication / Cryptographic software

County of Sacramento Inter-Departmental Correspondence For the Agenda of: June 2, 2005 Date:

Add to Reading List

Source URL: www.technology.saccounty.net

Language: English - Date: 2012-04-23 19:09:14
297Cryptography / Information security / National security / Public safety / Encryption / Information security audit / Electronic business / Security / Data security / Computer security

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.31 Encryption of Confidential and Sensitive Information Approved September 4, 2009 Revised August 14, 2013

Add to Reading List

Source URL: rules.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
298Advanced Encryption Standard / ICE / RC4 / Advantage / Cipher / Key schedule / Serpent / Data Encryption Standard / Format-preserving encryption / Cryptography / Block ciphers / Stream ciphers

Transparent Harddisk Encryption Thomas Pornin ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, 45 rue d’Ulm, 75005 Paris, France

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
299Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:07
300Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
UPDATE