Encryption software

Results: 1087



#Item
141Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
142Substitution cipher / Encryption software / Encryption / Classical cipher / Vigenère cipher / Cryptography / Cipher / Caesar cipher

Blown to Bits Your Life, Liberty, and Happiness After the Digital Explosion Hal Abelson

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:41
143Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
144Windows Server / Software / Data management / Data security / Encryption / Windows XP editions / Encrypting File System / Hardware-based full disk encryption / Microsoft Windows / Disk encryption / Cryptography

Wave Encryptor Hard Disk Encryption Auditor – immediately recognize security risks by identifying WiFi ports or devices currently or historically connected to endpoints.

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:35
145FIPS 140-2 / HMAC / Microsoft CryptoAPI / Critical Security Parameter / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key Wrap / Zeroisation / Cryptography / Cryptographic software / Cryptography standards

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
146ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
147Computing / Computer security / Cryptographic software / Privacy of telecommunications / Email privacy / Email encryption / Encryption / Privacy / Pretty Good Privacy / Internet privacy / Email / Cryptography

CHAPTER to put PGP on the Internet for use in the U.S., and in conformance with export controls. By the end of the decade, the

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:44
148Cross-platform software / Oracle Database / Oracle Corporation / Transparent Data Encryption / DUAL table / Oracle Technology Network / Database / Oracle Enterprise Manager / Oracle RAC / Software / Computing / Relational database management systems

Oracle® Database 2 Day + Security Guide 12c ReleaseE17609-21 May 2015

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-05-28 22:26:58
149Computing / Password / Tap / Software / Security token / One-time password / Apple Inc. / IPhone

I. What is OTP? ОТР /One Time Password/ is encryption software based on smartphone, will be used for securely log into your online banking service.

Add to Reading List

Source URL: www.ebank.mn

Language: English - Date: 2014-05-21 03:45:43
150Advantage / Tiny Encryption Algorithm / Random oracle / 0K / Chosen-ciphertext attack / Cryptography / Optimal asymmetric encryption padding / Semantic security

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
UPDATE