Encryption

Results: 4595



#Item
461Cryptography / Encryption / Cloud computing / Public-key cryptography / Cipher / Computer security / Cloud computing security / Perspecsys

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-09 09:17:21
462Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Secure multi-party computation / Paillier cryptosystem / Communications protocol / Cryptographic protocol / Secret sharing / Data Encryption Standard

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
463Cryptography / Wearable computers / Augmented reality / Display technology / Eyewear / Google Glass / Plaintext / Visual cryptography / Data Encryption Standard / Seiko Epson / RSA

Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices Sarah J. Andrabi Michael K. Reiter

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:51
464Block ciphers / Cryptography / Free software / Serpent / Data Encryption Standard / Python / Cipher / Crypt / Advanced Encryption Standard / Reference implementation / Python syntax and semantics

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
465Linear algebra / Transformation / Affine geometry / Advanced Encryption Standard / Linear map / Equivalence of categories / Affine space / Affine transformation

Introduction Linear redundancy in AES-like Sboxes The affine equivalence of XSL-like round functions Analyzing the influence of linear redundancy in S-boxes with affine

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:54
466Authenticated encryption / Symmetric-key cryptography / Block cipher / Public-key cryptography / Cryptography / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-10 11:24:57
467Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
468Smart cards / Cryptography standards / ISO standards / Ubiquitous computing / Embedded operating systems / FIPS 140 / Subscriber identity module / ISO/IEC / Gemalto / Card reader / Cryptographic Module Validation Program / Advanced Encryption Standard

Microsoft Word - 4n - D1314918_MAV31_FIPS_SP 1.12.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-07 11:28:48
469Homeomorphisms / Homomorphic encryption / Public-key cryptography / Cryptography / Encryption

Outsourcing Computations to the Cloud Advisor(s): Daniel Slamanig, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
470Electric power distribution / Electric power / Smart grid / Emerging technologies / Smart meter / Electrical grid / Electricity meter / Privacy / Internet privacy / Meter data management / Load profile / Encryption

Strüker & Kerschbaum / Data-Privacy in Deregulated Smart Grids FROM A BARRIER TO A BRIDGE: DATA-PRIVACY IN DEREGULATED SMART GRIDS Completed Research Paper

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-02-03 08:52:12
UPDATE