Encryption

Results: 4595



#Item
401Advanced Encryption Standard / Flush / Side-channel attack / Tiny Encryption Algorithm

Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
402Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-08-02 22:30:34
403Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
404Computers and the environment / Computer performance / Standard Performance Evaluation Corporation / Power management / Disk encryption / Atom / Benchmark / OpenSUSE / Operating system / Run-time estimation of system and sub-system level power consumption

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H. Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher {pahp, reiher}@cs.ucla.edu ,

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
405Payment systems / E-commerce / Cryptography / Tokenization / Payment Card Industry Data Security Standard / Heartland Payment Systems / Credit card / Data security / Debit card / Point to Point Encryption / Payment terminal

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness The Next Step: Complete Data Security 17 Aug:25 PM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:26:10
406Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
407Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
408Control theory / Cybernetics / Reputation system / Social information processing / Reputation / Negative feedback / Homomorphic encryption / Positive feedback / Recommender system / Zero-knowledge proof

A Verifiable, Centralized, Coercion-Free Reputation System Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-11-25 16:39:13
409Backup software / Business continuity and disaster recovery / Backup / Data synchronization / Server appliance / Remote backup service / Time Machine / Rsync / Server Message Block / Incremental backup / Network-attached storage / File area network

A Powerful and Economical NAS Featuring 4K Multimedia Playback and Hardware Encryption AS3102T A powerful built-in Intel dual-core processor allows the AS3102T to provide smooth 4K ultra high definition multimedia playba

Add to Reading List

Source URL: www.umax.cz

Language: English - Date: 2016-04-26 10:45:28
410Homeomorphisms / Homomorphic encryption / Public-key cryptography / Learning with errors / Spectral theory

FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-13 09:13:32
UPDATE