Encryption

Results: 4595



#Item
231Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
232Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: fellows.acm.org

Language: English - Date: 2015-03-30 17:41:07
233Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

Add to Reading List

Source URL: fast.dpdk.org

Language: English - Date: 2016-07-28 16:30:34
234Homeomorphisms / Homomorphic encryption / Public-key cryptography / FHE / Cryptography / Academia / Mathematics

C:/Users/koblitz.NETID/Downloads/tight2.dvi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2016-04-20 17:13:18
235Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:12
236Cryptography / Computer security / Bundesdatenschutzgesetz / German law / Secure transmission / Encryption / Medical privacy / Law

    Inform ation regarding the declaration of consent: ImpactDOCK Hamburg collects, processes, stores and uses the personal data provided by the immigrant based on the questionnaire. Disclosure of this information i

Add to Reading List

Source URL: impactdock.de

Language: English - Date: 2016-07-29 08:37:09
237Software / Computing / BitTorrent / Concurrent computing / Goalbit / Peer-to-peer / Torrent file / Peer-to-Peer Assisted Streaming Solution / EMule / Ares Galaxy / BitTorrent protocol encryption / Torrent poisoning

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

Add to Reading List

Source URL: goalbit-solutions.com

Language: English - Date: 2016-02-19 12:51:03
238Cryptography / Computing / Hypertext Transfer Protocol / Key management / Cryptographic protocols / Secure communication / HTTP cookie / Transport Layer Security / Public-key cryptography / Encryption / Key / Session

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 13:05:22
239System software / Software / Disk encryption / Cryptography / Cryptographic software / Ransomware / Computer virus / Deception / Internet security / Encryption / Antivirus software / Linux.Encoder.1

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:33:34
240Identity management / Law / Privacy / Internet privacy / Pi / Analysis

BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren 1 Martín Ochoa 2,3

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
UPDATE