Encryption software

Results: 1087



#Item
971Software / Encryption software / Encryption / Ciphertext / Data security / Advanced Encryption Standard / BitLocker Drive Encryption / Cryptography / Cryptographic software / Disk encryption

Security and Snake Oil: Choosing the right encryption software One of the best solutions to the need to protect sensitive information is through data encryption.

Add to Reading List

Source URL: www.winencrypt.com

Language: English - Date: 2009-01-08 06:10:11
972Indocrypt / Fast Software Encryption / Indian Statistical Institute / Cryptographic hash function / IEEE Transactions on Information Theory / National Security Agency / Diffie–Hellman problem / Cryptography / Computational hardness assumptions / Finite fields

Curriculum Vitae Palash Sarkar Professor Applied Statistics Unit Indian Statistical Institute

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2014-04-16 02:49:00
973Disk encryption / Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / NTFS / USB flash drive / Microsoft Windows / Cryptography / Computer security

Bitlocker and Windows Vista This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates. Nitin Kumar

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:35:04
974Internet privacy / Cryptographic software / Pretty Good Privacy / Phil Zimmermann / Encryption / Internet security / Cipher / Whitfield Diffie / Strong cryptography / Cryptography / Public-key cryptography / Cypherpunks

An Introduction to Cryptography Copyright © 1990–2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 7.0

Add to Reading List

Source URL: www.pgpkeys.org

Language: English - Date: 2006-08-22 14:35:54
975Cryptographic software / Software / Windows Vista / Windows Server / BitLocker Drive Encryption / Windows 7 / Trusted Platform Module / Cold boot attack / Microsoft Windows / Cryptography / Disk encryption

Analysis of Window Vista Bitlocker Drive Encryption This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:34:25
976Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
977Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Chosen-plaintext attack / Ciphertext / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
978Windows Vista / Windows Server / Windows NT / Windows 8 / BitLocker Drive Encryption / Windows To Go / Windows Recovery Environment / USB flash drive / Windows / Microsoft Windows / Software / System software

Configuring Windows To Go as a Mobile Desktop Solution Windows To Go is a new feature of Windows 8 Enterprise that allows a fully functional Windows 8 instance to be run from an external USB flash drive. When a host mach

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-12-18 09:39:10
979System software / Computing / TrueCrypt / On-the-fly encryption / NTFS / Filesystem in Userspace / USB flash drive / File system / Deniable encryption / Software / Cryptographic software / Disk encryption

TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE Version Information TrueCrypt User’s Guide, version 3.1a. Released February 7, 2005.

Add to Reading List

Source URL: docs.huihoo.com

Language: English - Date: 2008-12-05 04:23:51
980Data Encryption Standard / RC6 / Cryptographic software / Cipher / Key size / Triple DES / Serpent / XSL attack / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

136 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010 Switching between the AES-128 and AES-256 Using Ks * & Two Keys

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2014-03-16 20:13:45
UPDATE