Encryption

Results: 4595



#Item
81

Encryption In PostgreSQL NTT OSS Center Moon Insung PGConf.ASIACopyright©2017 NTT Corp. All Rights Reserved.

Add to Reading List

Source URL: www.pgconf.asia

Language: English - Date: 2017-11-30 23:15:35
    82

    Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things Tim Güneysu University of Bremen and DFKI, Germany

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2017-05-09 05:20:22
      83

      A new framework for code-based encryption and more J.-C. Deneuville <> April the 5th , 2018 Code-based Cryptography Workshop

      Add to Reading List

      Source URL: www.math.fau.edu

      Language: English - Date: 2018-04-06 11:47:14
        84

        Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

        Add to Reading List

        Source URL: www.cs.technion.ac.il

        Language: English - Date: 2016-01-11 11:15:52
          85

          A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model Presented by: Angela Robinson Department of Mathematical Sciences, Florida Atlantic University April 4, 2018

          Add to Reading List

          Source URL: www.math.fau.edu

          Language: English - Date: 2018-04-05 10:43:42
            86

            Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

            Add to Reading List

            Source URL: keccak.team

            Language: English - Date: 2017-08-22 12:54:45
              87

              NAME ee — An encryption shell that is easy to use for terminal users. SYNOPSIS ee [ −a name] [ −s integer] DESCRIPTION ee is a simple shell that runs commands from the PATH of the shell from which ee was invoked. A

              Add to Reading List

              Source URL: www.inf.fu-berlin.de

              Language: English - Date: 2016-10-12 09:26:14
                88

                Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

                Add to Reading List

                Source URL: www.cs.bham.ac.uk.

                Language: English - Date: 2017-10-30 14:38:29
                  89

                  ANALYSIS OF PUBLIC-KEY ENCRYPTION SCHEMES IN EXTENDED ATTACK MODELS Dale Luke Sibborn

                  Add to Reading List

                  Source URL: www.isg.rhul.ac.uk

                  Language: English - Date: 2016-01-11 06:40:42
                    90

                    APPLICATION FORM - SIGNATURE / ENCRYPTION CERTIFICATE FOR INDIVIDUAL (E) Application ID: (S)

                    Add to Reading List

                    Source URL: www.e-mudhra.com

                    Language: English - Date: 2018-06-20 01:16:33
                      UPDATE