Encryption

Results: 4595



#Item
541Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
542

Tightly Secure Signatures and Public-Key Encryption Dennis Hofheinz and Tibor Jager Karlsruhe Institute of Technology, Germany {dennis.hofheinz,tibor.jager}@kit.edu Abstract

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:37
    543

    Pigpen Cipher Encryption for GALOIS GROUP: Translate this phrase:

    Add to Reading List

    Source URL: www.coloradomath.org

    - Date: 2015-10-11 06:49:05
      544

      SecretAgent® 6.0 Encryption Architecture Plaintext File(s) © Information Security Corp. All rights reserved

      Add to Reading List

      Source URL: www.infoseccorp.com.

      - Date: 2008-11-20 13:37:29
        545Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

        Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2016-05-17 22:04:37
        546Malware / Ransomware / Cyberwarfare / Computer security / Encryption / TeslaCrypt / Encrypting File System

        How to remove CoinVault ransomware from your computer and restore your files Step 1: Are you infected with CoinVault? It is fairly easy to see if you are infected with CoinVault, because if you are, you will see an image

        Add to Reading List

        Source URL: noransom.kaspersky.com

        Language: English - Date: 2015-10-29 06:42:31
        547

        CBEAM: Ecient Authenticated Encryption from Feebly One-Way Author: φ

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2014-02-27 17:44:36
          548

          Laptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance By Julie Machal-Fulks and Robert J. Scott Laptop Data Breaches: Mitigating Risks

          Add to Reading List

          Source URL: www.scottandscottllp.com

          Language: English - Date: 2011-12-05 18:39:18
            549

            IEEE Symposium on Security and Privacy, San Jose, CA, MayDynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign • The inform

            Add to Reading List

            Source URL: seclab.illinois.edu

            Language: English - Date: 2014-03-29 23:43:25
              550

              NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

              Add to Reading List

              Source URL: 131002.net

              Language: English - Date: 2015-03-16 05:30:12
                UPDATE