Encryption

Results: 4595



#Item
531

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption⋆ ⋆⋆ Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2008-11-18 04:38:15
    532Cryptography / Security / Secrecy / Data protection / Privacy / Confidentiality / Password / Information privacy / Safeguard / Encryption / Information security

    Guideline 4 Confidentiality Guidelines Confidentiality refers to guidelines within bowls about when information can be shared, with whom and rules around when it is not appropriate to share information. Every effort shou

    Add to Reading List

    Source URL: www.safeguardingbowls.org

    Language: English - Date: 2016-04-29 03:35:20
    533Mathematics / Elementary mathematics / Music / Functions and mappings / Search algorithms / Calques / Earworm / Music psychology / Advanced Encryption Standard / Derivative / Variable / Hash function

    The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:32:13
    534Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English
    535

    Practical Chosen Ciphertext Secure Encryption from Factoring Dennis Hofheinz1? , Eike Kiltz2 , and Victor Shoup3 1 3

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:42
      536

      Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts Nuttapong Attrapadung1 , Benoˆıt Libert2? , and Elie de Panafieu3 2 1

      Add to Reading List

      Source URL: perso.uclouvain.be

      Language: English - Date: 2011-10-10 11:20:21
        537

        A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz? and Christoph Striecks?? Karlsruhe Institute of Technology, Karlsruhe, Germany Abstract. At Eurocrypt 2011, Wee presented a generalization

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:37
          538Academic authorship / Research / Scientific journal / Data Encryption Standard / Knowledge / Science and technology / Science

          The Dark Energy Survey Collaboration The Dark Energy Survey Publication Policy Version 12

          Add to Reading List

          Source URL: www.darkenergysurvey.org

          Language: English - Date: 2016-05-16 12:34:40
          539

          Practical Chosen Ciphertext Secure Encryption from Factoring Dennis Hofheinz? and Eike Kiltz?? Cryptology & Information Security Group CWI Amsterdam, The Netherlands {hofheinz,kiltz}@cwi.nl

          Add to Reading List

          Source URL: www.kjdf.de

          Language: English - Date: 2014-06-10 05:37:34
            540Prevention / Cryptography / Safety / Security / Secrecy / Safeguard / Confidentiality / Password / Encryption

            Microsoft Word - Guideline 4

            Add to Reading List

            Source URL: www.safeguardingbowls.org

            Language: English - Date: 2016-04-29 03:35:14
            UPDATE