Encryption

Results: 4595



#Item
71

Presentation on UNESCO publication “Encryption and Human Rights” By Xianhong Hu(UNESCO) Encryption, as a means to ensure the confidentiality of data, supports key human rights and fundamental values. In particular, i

Add to Reading List

Source URL: www.privacyconference2017.org

Language: English - Date: 2017-09-20 03:07:23
    72The Advanced Encryption Standard  Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

    The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2017-10-11 05:55:14
      73ICDPPC Open Session Encryption and Privacy in the Digital Age 29 SeptemberEncryption and Privacy under the PRC Laws Prof. dr. Hong Xue © 2017 Director of Institute for Internet Policy & Law Beijing Normal Univers

      ICDPPC Open Session Encryption and Privacy in the Digital Age 29 SeptemberEncryption and Privacy under the PRC Laws Prof. dr. Hong Xue © 2017 Director of Institute for Internet Policy & Law Beijing Normal Univers

      Add to Reading List

      Source URL: www.privacyconference2017.org

      Language: English - Date: 2017-09-20 03:07:23
        74Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

        Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

        Add to Reading List

        Source URL: www.bmoeller.de

        Language: English - Date: 2006-01-02 00:25:23
          75The Sesame Algorithm: Session Management for Asynchronous Message Encryption Moxie Marlinspike Trevor Perrin (editor)

          The Sesame Algorithm: Session Management for Asynchronous Message Encryption Moxie Marlinspike Trevor Perrin (editor)

          Add to Reading List

          Source URL: signal.org

          Language: English - Date: 2018-01-17 14:27:56
            76The Advanced Encryption Standard  Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

            The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2017-10-11 05:55:14
              77Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

              Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

              Add to Reading List

              Source URL: 2012.pairing-conference.org

              Language: English - Date: 2016-10-23 14:53:38
                78Efficient Threshold Encryption from Lossy Trapdoor Functions Xiang Xie, Rui Xue and Rui Zhang SKLOIS Chinese Academy of Sciences

                Efficient Threshold Encryption from Lossy Trapdoor Functions Xiang Xie, Rui Xue and Rui Zhang SKLOIS Chinese Academy of Sciences

                Add to Reading List

                Source URL: pq.crypto.tw

                Language: English - Date: 2017-06-19 04:11:45