Encryption software

Results: 1087



#Item
11Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: web.cs.ucdavis.edu

- Date: 2004-02-12 14:18:41
    12An earlier version of this paper appears at Fast Software EncryptionFSEThe Software Performance of Authenticated-Encryption Modes Ted Krovetz∗

    An earlier version of this paper appears at Fast Software EncryptionFSEThe Software Performance of Authenticated-Encryption Modes Ted Krovetz∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    - Date: 2011-03-21 19:25:18
      13Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

      Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-02 21:42:44
      14Crypto Device Drivers ReleaseJuly 28, 2016  CONTENTS

      Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

      Add to Reading List

      Source URL: fast.dpdk.org

      Language: English - Date: 2016-07-28 16:30:34
      15GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

      GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

      Add to Reading List

      Source URL: goalbit-solutions.com

      Language: English - Date: 2016-02-19 12:51:03
      16How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

      How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

      Add to Reading List

      Source URL: www.nomoreransom.org

      Language: English - Date: 2016-07-25 04:33:34
      17CP-G10i-Flyer-v10.fh-2 [Converted]

      CP-G10i-Flyer-v10.fh-2 [Converted]

      Add to Reading List

      Source URL: www.cryptophone.de

      Language: English - Date: 2010-07-06 09:32:52
      18Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

      Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      19Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

      Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

      Add to Reading List

      Source URL: bacpuc.org.uk

      Language: English - Date: 2016-02-25 06:22:14
      20Microsoft Word - X-Wall DX_FAQ_v1.1.doc

      Microsoft Word - X-Wall DX_FAQ_v1.1.doc

      Add to Reading List

      Source URL: www.enovatech.net

      Language: English - Date: 2013-11-21 01:52:00