Encryption

Results: 4595



#Item
101

AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2015-10-04 23:56:22
    102

    Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 Adama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC)

    Add to Reading List

    Source URL: pqcrypto2013.xlim.fr

    Language: English - Date: 2013-06-24 09:56:00
      103

      AxCrypt File Encryption Software for Windows Quick Installation and Users Guide Version 1.7 or later July 2012

      Add to Reading List

      Source URL: www.axantum.com

      Language: English - Date: 2018-07-19 05:42:48
        104

        Concurrent 100G Offload & Encryption on Arm

        Add to Reading List

        Source URL: www.chelsio.com

        Language: English - Date: 2017-11-07 05:53:47
          105

          Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants Weipeng Lin, Ke Wang, Zhilin Zhang Hong Chen

          Add to Reading List

          Source URL: www.cs.sfu.ca

          Language: English - Date: 2017-03-23 16:39:12
            106Cryptography / Computer security software / Cryptographic software / OpenPGP / Privacy software / Key management / Public key infrastructure / Gpg4win / GNU Privacy Guard / Pretty Good Privacy / Email encryption / S/MIME

            The Gpg4win Compendium Secure e-mail and file encryption using GnuPG for Windows Based on a version by Ute Bahn, Karl Bihlmeier, Manfred J. Heinze, Isabel Kramer und Dr. Francis Wray. Extensively revised by Werner Koch,

            Add to Reading List

            Source URL: files.gpg4win.org

            Language: English - Date: 2017-09-04 06:25:11
            107

            avc_encryption_eset_201701_en

            Add to Reading List

            Source URL: www.av-comparatives.org

            - Date: 2017-04-03 08:39:27
              108

              Fully Homomorphic Encryption Using Ideal Lattices Craig Gentry Stanford University and IBM Watson

              Add to Reading List

              Source URL: www.cs.cmu.edu

              - Date: 2009-12-01 10:24:34
                109

                Purple: WWII age encryption Credit: Mark Pellegrini License: CC-BY-SA-2.5 Nate Drake introduces Brian Neal’s Python utility, which turns your modern

                Add to Reading List

                Source URL: s3.amazonaws.com

                - Date: 2018-01-15 07:34:50
                  UPDATE