Encryption

Results: 4595



#Item
801

Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:03
    802

    OpenTangerine Security rules of thumb Always have in mind security best practices, standards and privacy policy. All computers have to use encryption for company related resources.

    Add to Reading List

    Source URL: opentangerine.com

    - Date: 2016-01-08 03:07:36
      803

      Parallel & Dynamic Searchable Symmetric Encryption SENY KAMARA - MICROSOFT RESEARCH CHARALAMPOS PAPAMANTHOU – UC BERKELEY

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-04-09 20:34:00
        804

        Whoar ewe… Vidder, Inc. is the leader in developing network security solutions for defense, intelligence, and enterprise environments. Customers rely on Vidder for its expertise in areas such as encryption,

        Add to Reading List

        Source URL: www.cu.ipv6tf.org

        Language: English - Date: 2010-06-08 14:39:13
          805Public-key cryptography / Key management / Key server / Email / Internet / Computing / Technology

          Lightweight Encryption for Email Ben Adida 7 July 2005 joint work with

          Add to Reading List

          Source URL: assets.adida.net

          Language: English - Date: 2011-04-11 17:43:42
          806Stream ciphers / Block ciphers / KeeLoq / Data Encryption Standard / Tiny Encryption Algorithm / A5/1 / Key schedule / Slide attack / Nonlinear feedback shift register / ICE

          KeeLoq Robert R. Enderlein School of Computer and Communication Sciences Semester Project

          Add to Reading List

          Source URL: www.e7n.ch

          Language: English
          807

          Encryption and Data Loss Amalia Miller and Catherine Tucker University of Virginia and MIT Sloan (University of Virginia and MIT Sloan)

          Add to Reading List

          Source URL: weis2010.econinfosec.org

          Language: English
            808Differential cryptanalysis / Linear cryptanalysis / Block cipher / Stream cipher / Data Encryption Standard / S-box / Key schedule / Advanced Encryption Standard / NOEKEON / Higher-order differential cryptanalysis

            The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

            Add to Reading List

            Source URL: jda.noekeon.org

            Language: English - Date: 2013-08-28 07:53:38
            809

            Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

            Add to Reading List

            Source URL: www.privacyinternational.org

            Language: English - Date: 2015-06-18 04:03:15
              810

              BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

              Add to Reading List

              Source URL: www.onarlioglu.com

              Language: English - Date: 2014-12-17 18:44:25
                UPDATE