Encryption

Results: 4595



#Item
501Mathematics / Polynomials / Algebra / Equations / Applied mathematics / Computer algebra / Cryptanalysis / System of polynomial equations / Data Encryption Standard / Algebraic equation / Crypto

On polynomial systems arising from a Weil descent Based on joint works with JC Faug`ere, JJ Quisquater, L Perret, G Renault Christophe Petit

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:33
502

Scribe Notes for RSA Encryption and Signatures By Kevin Fournier RSA - Module n where n = pq and p,q -> safe primes

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:58
    503

    Securing Internet Communication No one could shop, pay bills, or conduct business securely on the Internet without the mathematics of encryption. Although based on algebraic facts proved centuries ago, today’s sophisti

    Add to Reading List

    Source URL: msc2010.org

    - Date: 2008-12-18 09:55:10
      504Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

      Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

      Add to Reading List

      Source URL: www.estv.admin.ch

      Language: English
      505

      Dynamic Searchable Encryption Via ! Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: web.engr.illinois.edu

      - Date: 2014-05-22 00:23:02
        506COSIC / Advanced Encryption Standard / Key size

        Cost of cryptography in hardware Ingrid Verbauwhede ingrid.verbauwhede-at-esat.kuleuven.be K.U.Leuven, ESAT- SCD - COSIC Computer Security and Industrial Cryptography

        Add to Reading List

        Source URL: ecc2011.loria.fr

        Language: English - Date: 2011-09-30 12:40:06
        507

        IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.7, JulyAutomata Designs for Data Encryption with AES using the Micron Automata Processor

        Add to Reading List

        Source URL: paper.ijcsns.org

        Language: English - Date: 2015-08-04 07:51:20
          508

          PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid Rakesh Bobba, Himanshu Khurana, Musab AlTurki and Farhana Ashraf University of Illinois at Urbana-Champaign {rbobba, hkhurana, al

          Add to Reading List

          Source URL: seclab.illinois.edu

          Language: English - Date: 2011-03-29 12:25:55
            509

            Group Encryption: Non-Interactive Realization in the Standard Model Julien Cathalo1 ⋆ , Benoˆıt Libert1 1 ⋆⋆ ,

            Add to Reading List

            Source URL: perso.uclouvain.be

            Language: English - Date: 2010-03-22 13:15:08
              510

              Enterprise Encryption and Key Management

              Add to Reading List

              Source URL: fsroundtable.org

              Language: English - Date: 2015-05-20 12:29:10
                UPDATE