Encryption

Results: 4595



#Item
491

On the Security of RSA Encryption in TLS Jakob Jonsson and Burton S. Kaliski Jr. RSA Laboratories, 20 Crosby Drive, Bedford, MA 01730, USA {jjonsson, bkaliski}@rsasecurity.com Abstract. We show that the security of the

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-31 12:21:24
    492

    Honey Encryption Beyond Message Recovery Security ∗ Joseph Jaeger† Thomas Ristenpart‡ Qiang Tang§

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-02-23 03:13:51
      493Cryptography / Public-key cryptography / Identity-based cryptography / ID-based cryptography / ID-1 / ID-based encryption / ID1 / Functional encryption / PKE / Key

      Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters Motivation

      Add to Reading List

      Source URL: ecc2011.loria.fr

      Language: English - Date: 2011-09-30 12:40:03
      494Cryptography / Public-key cryptography / Key management / Formal sciences / Algorithm / Theoretical computer science / Advanced Encryption Standard / Key / Data Encryption Standard

      (Comparing) Hardware Complexity of Cryptographic Algorithms Liam Marnane University College Cork Claude Shannon Institute

      Add to Reading List

      Source URL: mathsci.ucd.ie

      Language: English - Date: 2007-09-14 09:56:20
      495

      Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2005-03-01 14:19:32
        496

        Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:46:48
          497Cryptography / Cryptographic software / Key management / Strong cryptography / Pretty Good Privacy / Cypherpunk / Encryption / Key / Public-key cryptography / Export of cryptography from the United States / Phil Zimmermann / Data Encryption Standard

          Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

          Add to Reading List

          Source URL: object.cato.org

          Language: English - Date: 2012-12-14 18:44:35
          498Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

          Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

          Add to Reading List

          Source URL: opensecuritytraining.info

          Language: English - Date: 2015-10-14 22:12:02
          499System software / Computer architecture / Software / Disk file systems / Disk encryption / Cryptographic software / FreeBSD / GEOM / Dm-crypt / Loop device / Device file / Dd

          Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

          Add to Reading List

          Source URL: www.deer-run.com

          Language: English - Date: 2011-05-27 21:21:17
          500Cryptography / Software / Computer security / OpenPGP / Cryptographic software / Computer access control / USB / YubiKey / Gpg4win / GNU Privacy Guard / Public-key cryptography / Encryption

          GnuPG Installation, Key Generation, & Decryption

          Add to Reading List

          Source URL: www.yubico.com

          Language: English - Date: 2015-12-15 16:56:28
          UPDATE