Encryption

Results: 4595



#Item
761

PRO Secure USB 3.0 FIPS Portable Hard Drive READY With real-time XTS-AES 256-bit hardware encryption,

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2015-08-10 09:50:02
    762

    Benaloh’s Dense Probabilistic Encryption Revisited ? Laurent Fousse1 , Pascal Lafourcade2 , and Mohamed Alnuaimi3 1 3

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2012-12-05 06:09:37
      763

      Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-09-30 19:57:01
        764Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

        Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

        Add to Reading List

        Source URL: www.kutter-fonds.ethz.ch

        Language: English - Date: 2010-05-16 10:46:32
        765

        Enhanced Flexibility for Homomorphic Encryption Schemes via CRT Yin Hu, William J. Martin, Berk Sunar Worcester Polytechnic Institute Abstract. The Chinese Remainder Theorem (CRT) has numerous applications including in

        Add to Reading List

        Source URL: ecewp.ece.wpi.edu

        Language: English - Date: 2012-11-29 11:41:35
          766Search algorithms / K-nearest neighbors algorithm / Cryptography / K-d tree / Paillier cryptosystem / Public-key cryptography / Recommender system / Privacy / Encryption

          Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

          Add to Reading List

          Source URL: www.icir.org

          Language: English - Date: 2015-10-01 22:05:30
          767

          Information-flow control for programming on encrypted data∗ J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman April 13, 2012 Abstract Using homomorphic encryption and secure multiparty computation, cloud servers may

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-04-13 18:08:34
            768

            Analysis of S-box in Image Encryption Using Root Mean Square Error Method Iqtadar Hussaina , Tariq Shaha , Muhammad Asif Gondalb , and Hasan Mahmoodc a b c

            Add to Reading List

            Source URL: www.znaturforsch.com

            Language: English - Date: 2012-07-05 04:03:05
              769

              Quantum key distribution with floating bases and decoy states Yu.V. Kurochkin, A.K. Fedorov, and V.L. Kurochkin Russian Quantum Center, Skolkovo, Moscow, Russia Abstract In view of breaking public-key encryption a

              Add to Reading List

              Source URL: 2015.qcrypt.net

              Language: English - Date: 2015-09-22 01:51:04
                770

                Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

                Add to Reading List

                Source URL: www.cs.utoronto.ca

                Language: English - Date: 2011-09-08 00:17:47
                  UPDATE