Encryption by date

Results: 7



#Item
1Cryptography / Taxation in the United States / Social Security / Universal identifiers / Social Security number / Encryption / Computer security

Protection of SSNs Procedure Effective Date: Purpose: This procedure will ensure the protection and confidentiality of Social Security Numbers used by the Department of Labor and Industry (DLI). This procedure

Add to Reading List

Source URL: serve.mt.gov

Language: English - Date: 2014-12-12 15:10:39
2White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-20 03:30:14
3DRAFT Standard Statement – Encryption Title: Encryption Standard Document Number: SS[removed]Effective Date: xx/xx/2011 Published by: Department of Information Systems 1. Purpose

DRAFT Standard Statement – Encryption Title: Encryption Standard Document Number: SS[removed]Effective Date: xx/xx/2011 Published by: Department of Information Systems 1. Purpose

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:14
4Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel <edd@debian.org> with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
5Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
61  1

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
7A Cryptographic Review of Cipherunicorn-E

A Cryptographic Review of Cipherunicorn-E

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58