Encryption

Results: 4595



#Item
691

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:04:57
    692

    Fast Software Encryption 2011 Program All technical sessions take place in the Oticon-salen at DTU in Lyngby. Sunday 13 February 2011

    Add to Reading List

    Source URL: fse2011.mat.dtu.dk

    Language: English - Date: 2011-02-11 07:49:51
      693

      Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English - Date: 2010-12-10 09:15:33
        694

        Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en

        Add to Reading List

        Source URL: www2.imm.dtu.dk

        Language: English - Date: 2014-03-13 15:47:35
          695

          ICS Technology Dragon-2: Fast Stream Cipher Encryption Description Features

          Add to Reading List

          Source URL: icsd.i2r.a-star.edu.sg

          Language: English - Date: 2015-09-30 21:14:26
            696

            Background on EMV A New Attack on EMV Positive Results Concluding Remarks On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart and Mario Strefl

            Add to Reading List

            Source URL: www.isg.rhul.ac.uk

            Language: English - Date: 2012-02-29 10:40:25
              697Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

              strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

              Add to Reading List

              Source URL: www.strongswan.org

              Language: English - Date: 2007-05-26 10:12:50
              698

              ∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

              Add to Reading List

              Source URL: www.idmachines.com

              Language: English - Date: 2011-11-05 12:30:50
                699

                BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Middle East Technical University, Ankara Sabanci University, Istanbul Northeastern University, Boston Ahmet Talha Ozcan, Can Gemicioglu, Kaan

                Add to Reading List

                Source URL: www.mulliner.org

                Language: English - Date: 2015-01-28 10:09:27
                  UPDATE