Encryption

Results: 4595



#Item
581Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

Add to Reading List

Source URL: pankaj-k.net

Language: English - Date: 2007-02-02 01:42:32
582Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-08-21 05:45:15
583

Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken () November 12, 2015 Full disk encryption is a defensive measure in which all data stored on a physical disk or volume

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-11-13 10:32:33
    584Cryptographic software / Disk encryption / Email authentication / Cryptography / PGP / TrueCrypt / Pretty Good Privacy / Encryption / BlackBerry / Email encryption / RSA Security / GPGTools

    A Worldwide Survey of Encryption Products February 11, 2016 Version 1.0

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2016-02-11 00:03:04
    585

    Soundness of Formal Encryption in the Presence of Active Adversaries Daniele Micciancio and Bogdan Warinschi Dept. of Computer Science & Engineering University 

    Add to Reading List

    Source URL: www.cs.bris.ac.uk

    Language: English - Date: 2007-01-08 08:20:25
      586

      Algebra-based Encryption for Adaptive Indexing Artyom Nikitin and Panagiotis Karras Skolkovo Institute of Science and Technology Abstract. Today, outsourcing query processing tasks to remote cloud servers becomes a viabl

      Add to Reading List

      Source URL: fc16.ifca.ai

      Language: English - Date: 2016-02-08 20:23:37
        587

        Robust Authenticated-Encryption AEZ and the Problem that it Solves Viet Tung Hoang1,2 1 3

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2014-10-04 03:40:56
          588Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

          Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

          Add to Reading List

          Source URL: www.nds.rub.de

          Language: English - Date: 2015-12-11 07:25:27
          589Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / IdenTrust / Public key certificate / X.509 / Authentication

          IdenTrust™ Trust Network Community Bank Program Benefits Delivering Trust With Encryption and Authentication

          Add to Reading List

          Source URL: www.identrust.com

          Language: English - Date: 2014-02-20 16:11:56
          590Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

          Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

          Add to Reading List

          Source URL: cyber.law.harvard.edu

          Language: English - Date: 2016-01-31 21:23:48
          UPDATE