Encryption

Results: 4595



#Item
61CONTENTS Executive Summary Innovation, disruption and public policy Online piracy Commercial encryption Autonomous transportation

CONTENTS Executive Summary Innovation, disruption and public policy Online piracy Commercial encryption Autonomous transportation

Add to Reading List

Source URL: 2o9ub0417chl2lg6m43em6psi2i-wpengine.netdna-ssl.com

Language: English - Date: 2018-04-13 14:32:14
    62StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption Bernard Dickens III  Haryadi S. Gunawi

    StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption Bernard Dickens III Haryadi S. Gunawi

    Add to Reading List

    Source URL: people.cs.uchicago.edu

    Language: English - Date: 2018-01-21 21:03:11
      63Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

      Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

      Add to Reading List

      Source URL: courses.engr.illinois.edu

      Language: English - Date: 2016-02-02 12:14:19
      64Standards Based Security XML Signature (2nd Ed) XML Encryption

      Standards Based Security XML Signature (2nd Ed) XML Encryption

      Add to Reading List

      Source URL: events.oasis-open.org

      - Date: 2008-10-07 09:55:30
        65Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science The Johns Hopkins University Baltimore, USA

        Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science The Johns Hopkins University Baltimore, USA

        Add to Reading List

        Source URL: spar.isi.jhu.edu

        Language: English - Date: 2016-03-19 17:06:21
        66Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Add to Reading List

        Source URL: ccccspeed.win.tue.nl

        Language: English - Date: 2016-10-23 14:53:38
          67ACC Meeting April 24th, 2015 Meeting Minutes ! Jeff Whitworth Presentation

          ACC Meeting April 24th, 2015 Meeting Minutes ! Jeff Whitworth Presentation " Can do managed encryption # ability to retrieve passwords; have yet to turn on until they are assured that accounts are up to date etc.; have r

          Add to Reading List

          Source URL: acc.wp.uncg.edu

          Language: English - Date: 2015-10-02 09:32:33
            68A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman∗ Abstract An encryption method is presented with the novel property that publicly revealing an encryption ke

            A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman∗ Abstract An encryption method is presented with the novel property that publicly revealing an encryption ke

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2001-04-26 01:25:58
            69Authenticated encryption  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

            Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2017-10-30 14:38:29
              70TFHE Homomorphic encryption and (a little bit) faster bootstrapping. N. Gama2,1

              TFHE Homomorphic encryption and (a little bit) faster bootstrapping. N. Gama2,1

              Add to Reading List

              Source URL: jc2-2017.inria.fr

              Language: English - Date: 2017-05-09 09:15:28