Encryption

Results: 4595



#Item
351Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
352Cryptography / Encryption / Ciphertext / Cipher / Plaintext / Science and technology / Science / Mathematics / Multiple encryption / Authenticated encryption

Microsoft PowerPoint - ch5.ppt [相容模式]

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English - Date: 2012-08-25 21:38:28
353Cryptography / Format-preserving encryption / Deterministic encryption / Encryption / Cipher / Data Encryption Standard / RSA / Probabilistic encryption / Block cipher

Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:15
354Cryptography / Public-key cryptography / Algebra / Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Identity-based cryptography / Tate pairing / Weil pairing / Pairing / ID-based encryption

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
355Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-01-05 12:45:55
356Economy / Financial services / Money / Embedded systems / Payment systems / EMV / ISO standards / Ubiquitous computing / Smart card / Cash machine / Debit card / Payment terminal

Background on EMV A New Attack on EMV Positive Results Concluding Remarks On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart and Mario Strefl

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-02-29 10:40:25
357Cryptography / Encryption / Data Encryption Standard / Science and technology / Science

Wanted: Secret Codebreakers For Saturday Workshops Hosted by the Chatham Marconi Maritime Center Teacher: Joe Zahka

Add to Reading List

Source URL: www.chathammarconi.org

Language: English - Date: 2016-06-15 15:19:34
358Cryptography / End-to-end encryption / Computing / Cloud storage / Cloud computing / Online backup services / Cloud computing security / Centralized computing / Deterministic encryption

Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2015-10-27 14:52:24
359Security / Computer security / Computing / Cryptography / Computer access control / E-commerce / Computer network security / National security / Single sign-on / Authentication / Encryption / Cloud computing security

OS_IIR_CloudSecurity_Infographic_v6

Add to Reading List

Source URL: oneshield.com

Language: English - Date: 2016-06-30 14:58:41
360Computing / Cryptography / Cryptographic protocols / Network architecture / IPsec / Encryption / Information Security Group / Data

Jean Paul Degabriele Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-04-07 15:14:14
UPDATE