Encryption

Results: 4595



#Item
291Cryptography / Key management / Certificate authorities / Public key infrastructure / Transport Layer Security / E-commerce / Comodo SSL / Comodo Group / Extended Validation Certificate / Public key certificate / Root certificate / Outlook.com

Instant SSL Certificates Powerful, cost-effective security for e-commerce websites Why Instant SSL? • Highest levels of SSL security – 2048 bit digital signatures and up to 256 bit encryption

Add to Reading List

Source URL: www.instantssl.cn

Language: English - Date: 2013-01-17 06:29:07
292Cryptography / Stream ciphers / Pseudorandom number generators / Solitaire / Keystream / Playing card

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

Add to Reading List

Source URL: nifty.stanford.edu

Language: English - Date: 2006-02-28 18:53:58
293Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
294Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
295Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
296Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
297Cryptography / Advanced Encryption Standard / Block ciphers / Data Encryption Standard / Finite fields / Block size / Rijndael S-box / AES implementations / Blowfish

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:08:26
298Cryptography / Mix network / RSA / Cryptanalysis / Cipher

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Bj¨orn Terelius, Douglas Wikstr¨om, February 24, 2012

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:28
299Cryptography / Free software / Software / Cloud storage / Cryptographic software / OwnCloud / Disk encryption / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
300Cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Semantic security / Cryptosystem / RSA / Data Encryption Standard

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
UPDATE