Encryption software

Results: 1087



#Item
251Advanced Encryption Standard / Key size / Encryption / Universal Serial Bus / Brute-force attack / Comparison of encrypted external drives / Aloaha / Cryptography / Disk encryption / Cryptographic software

“With real-time AES hardware encryption, software free design and CESG CCTM accreditation, the iStorage diskG is the World’s most secure,

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2013-10-17 12:30:54
252Advanced Encryption Standard / Fish farming / Graphical Environment Manager / Software / System software / Aquaculture

Focus On Society Development 6th International Conference on Recirculating Aquaculture, Roanoke, WV

Add to Reading List

Source URL: media.dhweb.com.s3.amazonaws.com

Language: English - Date: 2012-12-21 15:03:04
253Computer programming / Computer file formats / Electronics / Write / AES3 / Circular buffer / Encryption software / Pointer / Dynamic-link library / Computing / Advanced Encryption Standard / Cryptographic software

MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 2.0

Add to Reading List

Source URL: www.marshallsoft.com

Language: English - Date: 2014-06-25 12:09:06
254Archive formats / Cross-platform software / DEFLATE / Gzip / Internet protocols / Zlib / Lossless data compression / LZ77 and LZ78 / Huffman coding / Software / Data compression / Computing

The CRIME attack HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2012-09-26 10:02:07
255Serpent / ICE / Advanced Encryption Standard / Completeness / Chosen-plaintext attack / Crypt / Ciphertext / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
256Special purpose file systems / Public-key cryptography / Filesystem-level encryption / Encryption / Data security / Database security / Vormetric / Disk encryption hardware / Cryptography / Disk encryption / Cryptographic software

Understanding and Selecting a Database Encryption or Tokenization Solution Securosis, L.L.C.

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:12
257Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Computer virus / Encryption / Malware / Antivirus software / Security / Data security / Computer security

HEALTH INFORMATICS Privacy, security and confidentiality JO LUCK

Add to Reading List

Source URL: www.achi.org.au

Language: English - Date: 2014-11-23 06:35:35
258ICE / Block cipher / Data Encryption Standard / MacGuffin / S-box / Ping / Computing / Software / System software / Computer arithmetic / Q

The MacGun Block Cipher Algorithm Matt Blaze AT&T Bell Laboratories 101 Crawfords Corner Road, Holmdel, NJUSA

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
259Software / Computing / FileVault / BitLocker Drive Encryption / TrueCrypt / PBKDF2 / Encryption software / NTFS / Keychain / Cryptography / Disk encryption / Cryptographic software

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-21 17:47:00
260Solid-state drive / USB flash drive / Universal Serial Bus / Data security / USB 3.0 / Advanced Encryption Standard / Cryptographic software / USB / Computer hardware / Cryptography / Disk encryption

PENDING Secure USB 3.0 Solid State Flash Drive IP 57 Rating

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2015-04-08 07:32:27
UPDATE