Encryption

Results: 4595



#Item
841

// E-MAIL CERTIFICATE E-mail certificate (S/MIME) allows you to add digital signature and encrypt messages and attachments. It provides you the highest level of online communication security. Encryption means that only y

Add to Reading List

Source URL: sslguru.in

Language: English - Date: 2014-09-03 06:01:00
    842

    Email Encryption Send confidential emails with confidence Send confidential emails with confidence, using Medicus Solution’s CipherPost Pro email encryption service. With CipherPost Pro, your message remains encryp

    Add to Reading List

    Source URL: msinc.com

    Language: English - Date: 2015-04-16 07:44:00
      843

      Secure MagStripe-Only Insert Reader Encryption For Magnetic Stripe Data ID TECH’s Secure Magstripe Only Insert Reader (MOIR) is designed to read and decode up to three tracks of magnetically-encoded information. This i

      Add to Reading List

      Source URL: idtech-japan.co.jp

      Language: English - Date: 2012-01-09 09:22:28
        844Cryptography / Cipher / Encryption / Public-key cryptography / Ron Rivest / End-to-end auditable voting systems / Index of cryptography articles

        Cryptographic Voting: A Tutorial Ben Adida 12 February 2005

        Add to Reading List

        Source URL: assets.adida.net

        Language: English - Date: 2011-04-11 17:40:14
        845

        A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

        Add to Reading List

        Source URL: www.cryptrec.go.jp

        Language: English - Date: 2012-06-27 04:05:28
          846

          LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Daniel Luchaup, University of Wisconsin—Madison; Kevin P. Dyer, Portland State University; Somesh Jha and Thomas Ristenpart, University of

          Add to Reading List

          Source URL: censorbib.nymity.ch

          Language: English
            847

            Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

            Add to Reading List

            Source URL: www.dcsec.uni-hannover.de

            Language: English - Date: 2015-05-21 08:55:30
              848

              Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs FX Standaert (S), G Rouvroy, JJ Quisquater, JD Legat UCL Crypto Group

              Add to Reading List

              Source URL: www.chesworkshop.org

              Language: English - Date: 2008-01-12 09:06:09
                849Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

                PDF Document

                Add to Reading List

                Source URL: jda.noekeon.org

                Language: English - Date: 2013-08-28 07:53:28
                850Cryptography / Onion routing / Chosen-ciphertext attack / Public-key cryptography / Transmission Control Protocol / Mix network / RSA / Encryption / Mixminion

                PDF Document

                Add to Reading List

                Source URL: www-users.cs.umn.edu

                Language: English - Date: 2008-05-30 10:39:07
                UPDATE