Encryption

Results: 4595



#Item
591

Percona Live Europe 2015: Data at Rest Encryption in Maria... file:///Users/mstekl/Downloads/encryption-101.html#6.1 Sergei Golubchik, Chief Architect

Add to Reading List

Source URL: www.percona.com

Language: English - Date: 2015-12-21 09:40:05
    592Cryptographic software / Cryptography standards / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / Key Wrap / Camellia / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English - Date: 2016-04-08 19:51:32
    593

    Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories August 20, 1994 Abstract

    Add to Reading List

    Source URL: crypto.com

    Language: English - Date: 2001-05-15 19:09:38
      594Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

      Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

      Add to Reading List

      Source URL: iacr.org

      Language: English - Date: 2010-11-05 17:58:40
      595

      2016 VORMETRIC DATA THREAT REPORT Trends in Encryption

      Add to Reading List

      Source URL: enterprise-encryption.vormetric.com

      Language: English - Date: 2016-03-30 08:12:08
        596

        1 Accelerating NTRU based Homomorphic Encryption using GPUs Wei Dai, Yarkın Doröz, Berk Sunar

        Add to Reading List

        Source URL: www.ieee-hpec.org

        Language: English - Date: 2015-04-02 19:57:47
          597Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

          Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

          Add to Reading List

          Source URL: www.vs.inf.ethz.ch

          Language: English - Date: 2015-09-17 04:43:33
          598Cryptography / Homomorphic encryption / Encryption / Internet of things / Paillier cryptosystem / Deterministic encryption / ElGamal encryption / Gateway / Key / Computer security / Cloud computing security / Data in use

          Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

          Add to Reading List

          Source URL: www.vs.inf.ethz.ch

          Language: English - Date: 2015-07-21 13:59:17
          599Time series / Stationary process / Bartlett / Data Encryption Standard

          Introduction to Time Series Analysis. Lecture 1. Peter Bartlett 1. Organizational issues. 2. Objectives of time series analysis. Examples. 3. Overview of the course. 4. Time series models.

          Add to Reading List

          Source URL: www.stat.berkeley.edu

          Language: English - Date: 2010-08-26 19:53:36
          600

          Kanguru Press Release   FOR IMMEDIATE RELEASE: Kanguru’s Rock Solid USB Encryption Partners with 

          Add to Reading List

          Source URL: www.tresys.com

          Language: English - Date: 2014-09-24 12:43:31
            UPDATE