Encryption software

Results: 1087



#Item
81Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
82Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
83

Fast Software Encryption 2011 Program All technical sessions take place in the Oticon-salen at DTU in Lyngby. Sunday 13 February 2011

Add to Reading List

Source URL: fse2011.mat.dtu.dk

Language: English - Date: 2011-02-11 07:49:51
    84Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

    strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2007-05-26 10:12:50
    85Computing / Software / Cloud storage / File hosting / Online backup services / Data synchronization / Internet protocols / OwnCloud / CardDAV / Client-side encryption / Dropbox / Frank Karlitschek

    UnPLUGging From Freemium File Hosting With ownCloud Searching for Privacy & Security in the Era of Big Data Jesse Bufton

    Add to Reading List

    Source URL: pdxlinux.org

    Language: English - Date: 2014-12-02 16:01:11
    86

    Secure USB 2.0 CESG CCTM Portable Hard Drive READY With real-time CBC-AES 256-bit hardware encryption, PIN access and software free design, the perfect

    Add to Reading List

    Source URL: www.istorage-uk.com

    Language: English - Date: 2015-08-10 07:19:17
      87Computer architecture / Computing / Computer engineering / Central processing unit / Computer memory / Instruction set architectures / Cache / Advanced Encryption Standard / CPU cache / Side-channel attack / ARM architecture / Reduced instruction set computing

      Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

      Add to Reading List

      Source URL: euler.ecs.umass.edu

      Language: English - Date: 2011-03-24 10:57:36
      88Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

      Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

      Add to Reading List

      Source URL: dedis.cs.yale.edu

      Language: English - Date: 2012-06-25 13:47:28
      89

      Lessons Learned in Implementing and Deploying Crypto Software Peter Gutmann University of Auckland Abstract Although the basic building blocks for working with strong encryption have become fairly widespread in the last

      Add to Reading List

      Source URL: www.cs.auckland.ac.nz

      Language: English - Date: 2006-07-06 01:29:50
        90Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

        Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

        Add to Reading List

        Source URL: tls.mbed.org

        Language: English - Date: 2016-01-19 07:39:30
        UPDATE