Symmetric-key algorithm

Results: 348



#Item
41SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:42:19
42Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
43ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
44Living with post quantum cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
45Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
46Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
47Security not by chance: the AltusMetrum hardware true random number generator Tom Marble  DebConf 14

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
48LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
49Brochure_VMEOffice_New2adjusted

Brochure_VMEOffice_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:28
50Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16