Encryption

Results: 4595



#Item
441Hybrid electric vehicles / Electric vehicle conversion / Macomb County /  Michigan / United States Army Materiel Command / United States Army TACOM Life Cycle Management Command / Delegation / Motivation / United States Army Tank Automotive Research /  Development and Engineering Center / Research / Apache Cassandra / Data Encryption Standard / Delegate

Recognizing the Need For, Impacts and Benefits of Effective Delegation in the Work Place CASSANDRA C. SMITH Graduate Research Thesis

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2012-06-05 04:12:15
442Cryptography standards / Cryptographic hash functions / Cryptography / FIPS 140-2 / FIPS 140 / SHA-2 / SHA-1 / Cryptographic Module Validation Program / Advanced Encryption Standard / Secure Hash Algorithm / Data Encryption Standard

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
443Cryptography / Applied mathematics / Key management / Cipher / Cryptanalysis / Block cipher / One-time pad / Data Encryption Standard / Key / Index of cryptography articles / Book:Cryptography

Modern Cryptography M. Edwards Recap Evolution of Cryptography

Add to Reading List

Source URL: xn--bta-yla.net

Language: English - Date: 2014-12-31 11:24:35
444CINVESTAV / Instituto Politcnico Nacional / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Algorithm / Block cipher / Field-programmable gate array / Elliptic curve cryptography / Reconfigurable computing / Cryptographic engineering

Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2007-02-03 23:20:56
445Randomness / Formal sciences / Physical unclonable function / Information theory

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

Add to Reading List

Source URL: security1.win.tue.nl

Language: English - Date: 2016-01-03 03:15:37
446Mathematical optimization / Applied mathematics / Cryptography / Operations research / Search algorithms / Cryptanalysis / Metaheuristic / Linear cryptanalysis / Advanced Encryption Standard / Genetic algorithm

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
447Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
448Cryptography / Data Encryption Standard / Key management / Encryption / Key / Linoma Software / Vormetric

Microsoft Word - Field Encryption Press Release

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2013-10-10 00:00:01
449Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
450Transport Layer Security / Public key infrastructure / Cryptographic protocols / Secure communication / Public-key cryptography / Cisco Systems / Key management / Volume license key / Spark / Man-in-the-middle attack / End-to-end encryption / Certificate authority

White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE