Encryption

Results: 4595



#Item
191

Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption Yusuke Kawamoto1 Hideki Sakurada2 Masami Hagiya1 1 Department of Computer Science, Graduate School of Information Science and Technology,

Add to Reading List

Source URL: www.cs.bham.ac.uk

- Date: 2013-08-01 12:14:39
    192

    draft-ietf-httpbis-encryption-encoding-04 - Encrypted Content-Encoding for HTTP

    Add to Reading List

    Source URL: tools.ietf.org

    - Date: 2016-11-02 01:10:16
      193

      Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov1 , Lars R. Knudsen2 , Gregor Leander2 , Francois-Xavier Standaert3 , John Steinberger4 , and Elmar Tis

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2012-01-30 04:16:33
        194

        On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2006-02-15 04:14:19
          195

          Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2012-07-21 17:47:00
            196

            Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-09-14 09:48:53
              197

              CASE STUDY Validated Point-to-Point Encryption (P2PE)™ Solution THE MERCHANT Putting customer data security first…

              Add to Reading List

              Source URL: www.pcisecuritystandards.org

              - Date: 2016-04-14 12:51:04
                198

                Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai University, Chiang Mai, Thailand 5020

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                - Date: 2004-02-01 14:57:44
                  199

                  TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE www.truecrypt.org

                  Add to Reading List

                  Source URL: www.grc.com

                  - Date: 2014-06-01 12:27:08
                    200

                    Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2001-12-12 07:16:30
                      UPDATE