Strong cryptography

Results: 135



#Item
61Public-key cryptography / Open formats / Markup languages / XML / Digital signature / Signcryption / Oxygen XML Editor / Office Open XML / Cryptography / Computing / Computer file formats

Version 0.3 Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed]

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
62Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
63Computer crimes / Password / Phishing / Keystroke logging / Hacker / Password strength / Password manager / Cryptography / Security / Computer security

Newsletter N°[removed]NEWSLETTER N°[removed]This campaign aims to inform RESTENA users about the use of strong passwords. CAREFULLY SELECT A PASSWORD

Add to Reading List

Source URL: www.restena.lu

Language: English - Date: 2013-04-16 07:29:21
64Password / Cryptography / Password strength / Password policy / Security / Access control / Computer security

Web Plus Enforced User Password Criteria As a user of Web Plus, strong passwords are extremely important due to the nature of information being entered and stored. As such, Web Plus will automatically enforce the follow

Add to Reading List

Source URL: mcr.umh.edu

Language: English - Date: 2014-11-19 12:26:43
65Public-key cryptography / Random oracle / Perfect forward secrecy / Transport Layer Security / Standard model / Oracle machine / Key / Digital signature / Advantage / Cryptography / Cryptographic protocols / Key management

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 19:28:13
66Key management / Electronic commerce / Elliptic curve cryptography / IEEE P1363 / Strong prime / RSA / Digital signature / Digital Signature Algorithm / PKCS / Cryptography / Public-key cryptography / Cryptography standards

Public Comments Regarding FIPS 186-1, Digital Signature Standard (DSS) [in response to a notice in the December 15, 1998 Federal Register (Volume 63, Number 240; pages[removed]From: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-04-12 16:50:34
67Public key certificate / Electronic signature / Privacy of telecommunications / Cryptography / Security / Identity document

NB: Unofficial translation; legally binding texts are those in Finnish and Swedish Act on Strong Electronic Identification and Electronic Signatures[removed])

Add to Reading List

Source URL: www.finlex.fi

Language: English
68Authentication / Notary / Packaging / Password / Biometrics / Strong authentication / Two-factor authentication / Security token / Security / Cryptography / Access control

IdentityX Joins FIDO Alliance Board Company Joins Industry Leaders to Create a More Secure Digital Presence for Consumers Fairfax, VA and Mountain View, CA – March 6, 2014 – The FIDO (Fast IDentity Online) Alliance (

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-03-06 01:24:20
69Cryptography / Password / Password strength / Password cracking / Security / Computer security / Access control

Introduction • Creating strong passwords may seem daunting, especially when you have many online accounts you need to protect. Anyone would be

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-10-02 17:45:31
70Clipper chip / Key escrow / Strong cryptography / Key size / Data Encryption Standard / Encryption / Key / Export of cryptography in the United States / Disk encryption / Cryptography / Key management / 56-bit encryption

Encryption Policy Issues Jon M. Peha1 October 1998 Section 1: Introduction Controlling the flow of information in the information age is as important as controlling the

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 1998-10-25 07:50:27
UPDATE