Encryption

Results: 4595



#Item
991Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
992Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:22
993Disk encryption / Regulation of Investigatory Powers Act / Password / Key / RSA / Cryptography / Key management / Public-key cryptography

FIPR Response to the Home Office: “Consultation on the Draft Code of Practice for the Investigation of Protected Electronic Information – Part III of the Regulation of Investigatory Powers Act 2000”

Add to Reading List

Source URL: fipr.org

Language: English - Date: 2006-09-04 06:53:04
994X86 architecture / Cryptographic software / AES instruction set / Advanced Encryption Standard / OpenSSL / X86-64 / X86 / Itanium / Xeon / Computer architecture / Computing / Instruction set architectures

OpenSSL FIPS Object Module VersionBy the OpenSSL Software Foundation

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2014-06-06 13:16:17
995Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
996Computer network security / Internet protocols / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: tcpcrypt.org

Language: English - Date: 2010-06-02 09:05:19
997Computing / Internet protocols / Cryptographic software / Email / Cryptographic protocols / X.509 / Domain Name System Security Extensions / Opportunistic encryption / S/MIME / Cryptography / Internet / Public-key cryptography

Intro The Plan Implementation

Add to Reading List

Source URL: www.g10code.com

Language: English - Date: 2011-11-14 04:16:35
998Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security

Microsoft Word - Contents Thesis 1.10.doc

Add to Reading List

Source URL: www.few.vu.nl

Language: English - Date: 2015-06-15 16:32:20
999Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
1000Exponentiation by squaring / Matrix / Multiplication / Mathematics / Advanced Encryption Standard / Computer arithmetic

FHE-MPC Notes Lecturer: Marcel Keller Scribe: Enrique Larraia Lecture # 9 5th December 2011

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2011-12-08 13:25:50
UPDATE