Encryption

Results: 4595



#Item
251Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-09-25 11:36:46
252Real estate / Construction / Building engineering / Engineering / Piping / Submittals / Construction (Design and Management) Regulations / General contractor / Data Encryption Standard

DELRAY BEACH CRA ARTS WAREHOUSE RENOVATIONS DELRAY BEACH, FLORIDA PROJECT SPECIFICATIONS TABLE OF CONTENTS Section

Add to Reading List

Source URL: delraycra.org

Language: English - Date: 2016-05-01 21:37:00
253Computer data storage / Hard disk drives / Computer hardware / Computer storage devices / Seagate Technology / Computing / Hardware-based full disk encryption

Savvio 10K.6 ® Data Sheet Enterprise Performance 10K HDD—The Perfect Performance Upgrade

Add to Reading List

Source URL: www.seagate.com

Language: English - Date: 2013-12-24 11:11:58
254Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
255Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
256Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-30 23:23:40
257Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
258Advanced Encryption Standard / MD2 / Finite fields / Rijndael S-box / TI MSP430

Microsoft PowerPoint - HPTS_2009.ppt

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:42
259Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
260Computing / Security / Cryptography / Crime prevention / Information governance / National security / Disk encryption / Computer security / Encryption / Android / Information security / USB flash drive

Desktop, Laptop, and Portable Device DRAFT - Data Classification System Requirements September 12, 2013 Purpose of this document This document outlines and provides an explanation for some of the most important and possi

Add to Reading List

Source URL: facultysenate.mst.edu

Language: English - Date: 2014-01-22 04:21:56
UPDATE