Encryption

Results: 4595



#Item
71

Presentation on UNESCO publication “Encryption and Human Rights” By Xianhong Hu(UNESCO) Encryption, as a means to ensure the confidentiality of data, supports key human rights and fundamental values. In particular, i

Add to Reading List

Source URL: www.privacyconference2017.org

Language: English - Date: 2017-09-20 03:07:23
    72

    The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2017-10-11 05:55:14
      73

      ICDPPC Open Session Encryption and Privacy in the Digital Age 29 SeptemberEncryption and Privacy under the PRC Laws Prof. dr. Hong Xue © 2017 Director of Institute for Internet Policy & Law Beijing Normal Univers

      Add to Reading List

      Source URL: www.privacyconference2017.org

      Language: English - Date: 2017-09-20 03:07:23
        74

        Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

        Add to Reading List

        Source URL: www.bmoeller.de

        Language: English - Date: 2006-01-02 00:25:23
          75

          The Sesame Algorithm: Session Management for Asynchronous Message Encryption Moxie Marlinspike Trevor Perrin (editor)

          Add to Reading List

          Source URL: signal.org

          Language: English - Date: 2018-01-17 14:27:56
            76

            The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2017-10-11 05:55:14
              77

              Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

              Add to Reading List

              Source URL: 2012.pairing-conference.org

              Language: English - Date: 2016-10-23 14:53:38
                78

                Efficient Threshold Encryption from Lossy Trapdoor Functions Xiang Xie, Rui Xue and Rui Zhang SKLOIS Chinese Academy of Sciences

                Add to Reading List

                Source URL: pq.crypto.tw

                Language: English - Date: 2017-06-19 04:11:45
                  UPDATE