Encryption

Results: 4595



#Item
341Cryptography / Emerging technologies / Data security / Public key infrastructure / Public-key cryptography / Internet privacy / Communications protocol / Smart grid / Privacy / Key management / Data Encryption Standard

Fault-Tolerant Privacy-Preserving Statistics Marek Jawurek and Florian Kerschbaum SAP Research Karlsruhe, Germany {marek.jawurek|florian.kerschbaum}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-07-15 10:28:51
342Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:22:52
343Cryptography / Cryptosystem / RSA / Public-key cryptography / Key / Symmetric-key algorithm / Encryption / Data Encryption Standard / Index of cryptography articles / MerkleHellman knapsack cryptosystem

Microsoft Word - WCECS2009 ICCSA_44 USA CAMERA MAGIC SQUARE ADD_ON SECURIT?

Add to Reading List

Source URL: www.iaeng.org

Language: English - Date: 2009-09-22 22:18:34
344Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
345Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Language: English - Date: 2015-09-29 10:45:40
346Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Symmetric-key algorithm / Cryptanalysis / Public-key cryptography / Stream cipher / Cipher / Hash function / Tiny Encryption Algorithm / Index of cryptography articles

An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:02
347Cryptography / Computing / Security / Public key infrastructure / Privacy of telecommunications / E-commerce / Secure communication / Lavabit / Email encryption / Transport Layer Security / Public-key cryptography / Encryption

Appeal: Doc: 37-1 Filed:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
348Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
349Software / Keyhole Markup Language / Route planning software / Web mapping / Visualization / Google / Google Maps / Ggplot2 / Advanced Encryption Standard

Package ‘ggmap’ January 23, 2016 VersionTitle Spatial Visualization with ggplot2 Description A collection of functions to visualize spatial data and models on top of static maps from various online sources (e.

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2016-01-22 18:37:30
350Chemistry / Electrophoresis / Gels / Matter / Molecular biology / Sol-gel / Data Encryption Standard / Polyacrylamide gel electrophoresis / Sol

Electronic Supplementary Data Authors are encouraged to take advantage of the recently started facility for submitting supplementary data in the electronic form. These data will be made available along with the online ve

Add to Reading List

Source URL: www.niscair.res.in

Language: English - Date: 2012-04-25 05:33:24
UPDATE