Encryption

Results: 4595



#Item
361Public-key cryptography / Homeomorphisms / Homomorphic encryption / Cryptography / Institute for Applied Information Processing and Communications / FHE

Cryptography for the Cloud Advisor(s): Christian Rechberger, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
362Documents / Information science / Data Encryption Standard / Email

附件 2 Instructions for the Preliminary Review of Academia Sinica Investigator Award, Cover 2. Content ● Index (please state in details)

Add to Reading List

Source URL: daais.sinica.edu.tw

Language: English - Date: 2016-01-06 03:51:04
363Microcontrollers / Disk encryption / Instruction set architectures / Cryptographic software / Non-volatile memory / PIC microcontroller / USB flash drive / Serial Peripheral Interface Bus / In-system programming / Flash memory / Firmware / Encryption

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
364Cryptography / Disk encryption theory / Block cipher / Feistel cipher / Malleability / Advantage / Ciphertext indistinguishability

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
365Group theory / Finite fields / Public-key cryptography / Cryptography / Key management / Discrete logarithm / Index calculus algorithm / ElGamal encryption / Key / XTR / DiffieHellman key exchange / RSA

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2016-04-18 16:34:53
366Hacking / Software testing / BitLocker / Disk encryption / Windows Server / Windows Vista / Code injection / Cross-site scripting / SQL injection / Buffer overflow / Transmission Control Protocol / Vulnerability

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
367Cryptography / Symmetric-key algorithm / Cipher / Encryption / Public-key cryptography / RSA / Key / Block cipher mode of operation / Multiple encryption

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
368Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
369Disk encryption / Cryptographic software / Cryptography / Cross-platform software / Password / Erlang / Crypt / BitLocker / GBDE

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
370Graph theory / Cryptography / Dining cryptographers problem / Vertex / Public-key cryptography / Graph / Connected component / Data Encryption Standard

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
UPDATE