Encryption

Results: 4595



#Item
911

GreenNet CSIR Toolkit Briefing 3 Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 Encryption and Digital Signatures

Add to Reading List

Source URL: www.fraw.org.uk

- Date: 2015-04-07 17:08:28
    912

    CHAOCIPHER: ANALYSIS AND MODELS 2009 Jeffrey A. Hill, February 28, 2003, Revised April 12, 2009 ADDRESS: Lincoln, NebraskaABSTRACT: Chaocipher, a method of encryption invented by John F. Byrne in 1918, was touted

    Add to Reading List

    Source URL: www.mountainvistasoft.com

    - Date: 2009-10-30 09:43:07
      913

      CPK: Bounded Identity Based Encryption James Hughes Guan Zhi

      Add to Reading List

      Source URL: www.iacr.org

      - Date: 2007-07-03 11:15:44
        914

        File encryption using OpenSSL and GnuPG (GPG/PGP) Systems and Network Security Contents

        Add to Reading List

        Source URL: nsrc.org

        - Date: 2014-08-05 06:07:48
          915

          LibFTE: A User-Friendly Toolkit for Constructing Practical Format-Abiding Encryption Schemes Daniel Luchaup, Kevin Dyer, Somesh Jha,

          Add to Reading List

          Source URL: wisdom.cs.wisc.edu

          - Date: 2014-05-20 07:24:53
            916

            KG-340 Type 1 SONET Encryptor Government Strength Encryption at OC-192 Speeds

            Add to Reading List

            Source URL: www.raytheon.com

            - Date: 2015-04-23 16:02:52
              917

              Security II: Cryptography – exercises Markus Kuhn Lent 2014 – Part II Exercise 1: Show that an encryption scheme (Gen, Enc, Dec) over a message space M is perfectly secret if and only if

              Add to Reading List

              Source URL: www.cl.cam.ac.uk

              - Date: 2014-03-24 07:47:17
                918

                WHITE PAPER, g10code GmbH, STEED — Usable End-to-End Encryption Werner Koch, Marcus Brinkmann

                Add to Reading List

                Source URL: www.g10code.com

                - Date: 2011-11-04 13:30:01
                  919

                  Chosen-Ciphertext Security from Identity-Based Encryption∗ Dan Boneh† Ran Canetti‡

                  Add to Reading List

                  Source URL: www.cs.tau.ac.il

                  - Date: 2009-04-27 14:49:47
                    920

                    BRICS Basic Research in Computer Science BRICS RSCamenisch & Damg˚ard: Verifiable Encryption and Applications Verifiable Encryption and Applications to

                    Add to Reading List

                    Source URL: www.brics.dk

                    - Date: 1999-01-11 19:55:50
                      UPDATE