Encryption

Results: 4595



#Item
281Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:40:17
282Security / Cryptography / Prevention / Safety / Crime prevention / Information governance / National security / Computer security / Information security / Privacy / Internet of things / Encryption

Spring 2016: ICS 695 – Advanced Special Topics in Security: Advanced Security and Privacy for Internet of Things and its Applications Time Monday & Wednesday, 12:00-01:15pm.

Add to Reading List

Source URL: www2.hawaii.edu

Language: English - Date: 2015-10-29 18:36:38
283Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-03-09 11:24:03
284Software / Computing / System software / Cloud computing / Database / Cloud database / Filesystem-level encryption / Cloud computing security / Distributed file system for cloud

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
285Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
286Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
287Cryptography / RSA / Cipher / Cryptosystem / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext indistinguishability

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:05
288Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
289Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
290Cryptography / Stream ciphers / Data Encryption Standard / Py / VEST / DEAL / Authenticated encryption / Institute for Applied Information Processing and Communications

Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
UPDATE