Encryption

Results: 4595



#Item
241Cryptography / Authenticated encryption / Symmetric-key cryptography / Block cipher / Random oracle / RSA / Advantage / Encryption / Public-key cryptography

PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-25 00:46:55
242Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-07-06 09:32:52
243Computer data storage / Computer hardware / Computing / Computer storage devices / Computer storage media / Non-volatile memory / Disk encryption / Hard disk drives / Solid-state drive / Hardware-based full disk encryption / Seagate Technology / Sed

  Self-­‐Encrypting  Drive  Market  and  Technology  Report—Coughlin  Associates     Self-Encrypting Drive Market and Technology

Add to Reading List

Source URL: tomcoughlin.com

Language: English - Date: 2015-04-12 23:07:47
244Cryptography / Food and drink / Government of Pakistan / Tea culture / Tea / Tea ceremony / Inter-Services Intelligence / Lunch / Cryptanalysis / Gupta / Tiny Encryption Algorithm

DayAfternoon I 14:30 – 16:00

Add to Reading List

Source URL: www.isical.ac.in

Language: English
245Security / Biometrics / Prevention / Surveillance / Private biometrics / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
246Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:52:53
247Special functions / Disk encryption theory / XEX / Rectangular function

Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Phillip Rogaway ∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2006-12-11 12:04:14
248Computing / Email / Cyberspace / Spamming / Email encryption / Mimecast / Phishing / S/MIME / ProtonMail / Proofpoint /  Inc.

CoverCS - PROOFED BW3 FINAL FINAL.qxd

Add to Reading List

Source URL: www.btc.co.uk

Language: English - Date: 2016-05-16 06:54:47
249Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
250Physics / Quantum information science / Quantum mechanics / Covariance and correlation / Faster-than-light communication / Quantum entanglement / Correlation and dependence / G factor / Data Encryption Standard

Aspects and Consequences of Multi-Party Non-Locality Master Thesis Helen Ebbe Department of Mathematics, ETH Z¨urich

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2013-06-03 09:37:44
UPDATE