Encryption

Results: 4595



#Item
511Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-14 13:47:17
512

Tightly Secure CCA-Secure Encryption without Pairings Romain Gay1,? , Dennis Hofheinz2,?? , Eike Kiltz3,? ? ? , and Hoeteck Wee1,† 1 ENS, Paris, France

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2016-02-23 08:59:16
    513Cloud storage / Business continuity and disaster recovery / Data security / Disk encryption / Backup / Public-key cryptography / File system / Transparent Data Encryption / CTERA Networks

    Data: Making it be there where you want it, and making it be gone when you want it gone Radia Perlman

    Add to Reading List

    Source URL: tce.technion.ac.il

    Language: English - Date: 2015-06-21 01:59:30
    514Cryptography / Cryptography standards / Cryptographic software / Computing / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / SHA-2

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-05-11 21:52:06
    515

    Functional Encryption for Public-Attribute Inner Products: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation Nuttapong Attrapadung1 and Benoˆıt Libert2? 1 2

    Add to Reading List

    Source URL: perso.uclouvain.be

    Language: English - Date: 2011-01-03 08:05:43
      516Free software / Cryptography / Software / Cloud storage / OwnCloud / Disk encryption / Cryptographic software / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

      ownCloud Security and Encryption 2.0; A Technical Overview ownCloud, Inc. 57 Bedford Street, Suite 102

      Add to Reading List

      Source URL: owncloud.com

      Language: English - Date: 2016-03-16 13:42:38
      517Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

      Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:37:38
      518

      ETS Corporation Software Developer / Jr. DBA $80k – $100k/year Full Time Professional Position Headquartered in Sterling, Virginia. Duties Design and develop end-to-end encryption payment system that can be integrated

      Add to Reading List

      Source URL: www.etsms.com

      Language: English - Date: 2014-07-28 11:44:31
        519Steve Jobs / Computing / Business / Computer hardware / Personal computers / Apple Inc. / Advanced Encryption Standard / Macintosh / Apple Store

        Memorandum To: AES Unit Heads From:

        Add to Reading List

        Source URL: agritech.uark.edu

        Language: English - Date: 2015-10-27 11:48:06
        520

        White-Box Security Notions for Symmetric Encryption Schemes? C´ecile Delerabl´ee1 , Tancr`ede Lepoint1,2 , Pascal Paillier1 , and Matthieu Rivain1 1 CryptoExperts, 41 boulevard des Capucines, 75002 Paris, France

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2013-08-22 15:08:37
          UPDATE