Encryption

Results: 4595



#Item
311Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
312Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
313Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
314Light-emitting diode / Signage / Advanced Encryption Standard / Finite fields / Rijndael S-box / MD2

Controlling The Real World With Computers ::. Control And Embedded Systems .:: Table Of Contents Previous: Programming Part 3 Next: Programming Experiment 2

Add to Reading List

Source URL: learn-c.com

Language: English - Date: 2016-02-02 18:33:34
315Disk encryption / Software / Computer architecture / Computing / FDE / Android / Encryption / Cryptography

Power Analysis of Android Full Disk Encryption Advisor(s): Thomas Korak, Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
316Cryptography / Computer access control / Computer security / Password / Security / Disk encryption / Login / Crypt / Password manager / SAP Logon Ticket

Drive Encryption Procedure Drive Encryption End User Guide (Revision Date: Table of Contents Introduction ......................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-05-16 15:09:57
317Data Encryption Standard / Vehicle registration plate / Privacy of telecommunications

CHAPTER 38 Department of Public Safety (Statutory Authority: 1976 Code §§ 23–6–10 et seq. and 23–47–20(CARTICLE 1

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2016-05-06 09:06:16
318Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
319Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-05 03:04:49
320Cryptography / Applied mathematics / Data Encryption Standard / Cryptanalysis / Block cipher / Linear cryptanalysis / Differential cryptanalysis / S-box

Automatic tool for differential cryptanalysis of SPNs Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
UPDATE