Data Encryption Standard

Results: 514



#Item
51Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
52The Voice of Georgia’s Restaurants Advocacy | Education | Awareness The Next Step: Complete Data Security  17 Aug:25 PM |Anonymous

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness The Next Step: Complete Data Security 17 Aug:25 PM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:26:10
53International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
54Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
55Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2016-02-23 14:14:05
56A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
57Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
58Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury  Deepak Garg

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
59CP-G10i-Flyer-v10.fh-2 [Converted]

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-10-15 13:48:57
60NHBC Safemark Competency Accreditation Service Appointment form and registration pack (including document checklist) This form appoints Santia Accreditation to carry out NHBC Safemark Competency Accreditation for your c

NHBC Safemark Competency Accreditation Service Appointment form and registration pack (including document checklist) This form appoints Santia Accreditation to carry out NHBC Safemark Competency Accreditation for your c

Add to Reading List

Source URL: www.nhbc.co.uk

Language: English - Date: 2016-07-01 06:57:26