Encryption

Results: 4595



#Item
61

CONTENTS Executive Summary Innovation, disruption and public policy Online piracy Commercial encryption Autonomous transportation

Add to Reading List

Source URL: 2o9ub0417chl2lg6m43em6psi2i-wpengine.netdna-ssl.com

Language: English - Date: 2018-04-13 14:32:14
    62

    StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption Bernard Dickens III Haryadi S. Gunawi

    Add to Reading List

    Source URL: people.cs.uchicago.edu

    Language: English - Date: 2018-01-21 21:03:11
      63Cryptography / Advantage / Encryption / RSA / Cipher / Symmetric-key algorithm

      Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

      Add to Reading List

      Source URL: courses.engr.illinois.edu

      Language: English - Date: 2016-02-02 12:14:19
      64

      Standards Based Security XML Signature (2nd Ed) XML Encryption

      Add to Reading List

      Source URL: events.oasis-open.org

      - Date: 2008-10-07 09:55:30
        65Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Encryption / Attribute-based encryption / RSA / Cipher / Symmetric-key algorithm / Identity-based conditional proxy re-encryption / Semantic security

        Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science The Johns Hopkins University Baltimore, USA

        Add to Reading List

        Source URL: spar.isi.jhu.edu

        Language: English - Date: 2016-03-19 17:06:21
        66

        Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Add to Reading List

        Source URL: ccccspeed.win.tue.nl

        Language: English - Date: 2016-10-23 14:53:38
          67

          ACC Meeting April 24th, 2015 Meeting Minutes ! Jeff Whitworth Presentation " Can do managed encryption # ability to retrieve passwords; have yet to turn on until they are assured that accounts are up to date etc.; have r

          Add to Reading List

          Source URL: acc.wp.uncg.edu

          Language: English - Date: 2015-10-02 09:32:33
            68Cryptography / Public-key cryptography / E-commerce / RSA / Three-pass protocol / Cryptosystem / XTR / Schmidt-Samoa cryptosystem

            A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman∗ Abstract An encryption method is presented with the novel property that publicly revealing an encryption ke

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2001-04-26 01:25:58
            69

            Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2017-10-30 14:38:29
              70

              TFHE Homomorphic encryption and (a little bit) faster bootstrapping. N. Gama2,1

              Add to Reading List

              Source URL: jc2-2017.inria.fr

              Language: English - Date: 2017-05-09 09:15:28
                UPDATE