Cryptographic primitive

Results: 89



#Item
81Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
82Information / Cryptographic software / Internet protocols / Free software / ProVerif / Computer network security / Authentication protocol / Cryptographic primitive / CryptoVerif / Cryptographic protocols / Cryptography / Data

ProVerif 1.88: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial Bruno Blanchet1 , Ben Smyth1 , and Vincent Cheval2 1

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-08-30 03:11:35
83Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2003-06-16 01:39:22
84Software / Internet protocols / Cryptographic protocols / IPsec / Microsoft CryptoAPI / Cryptlib / Cryptographic primitive / Kernel / Packet Processing / Computing / Cryptographic software / Cryptography

Cryptography As An Operating System Service: A Case Study ANGELOS D. KEROMYTIS Columbia University JASON L. WRIGHT and THEO DE RAADT OpenBSD Project

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2006-12-09 23:39:37
85Cryptographic software / Cryptography standards / Windows NT / Windows Vista / CryptGenRandom / Cryptographic primitive / Kernel / FIPS 140 / Security token / Microsoft Windows / Cryptography / Computing

Microsoft Windows 7 Kernel Mode Cryptographic Primitives Library (cng.sys) Security Policy Document Microsoft Windows 7 Kernel Mode Cryptographic Primitives 

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-17 13:23:49
86Symmetric-key algorithm / Block cipher / Camellia / Cryptographic hash function / Cipher / Cryptographic primitive / ESTREAM / Outline of cryptography / Crypto++ / Cryptography / Advanced Encryption Standard / Stream ciphers

Lightweight Cryptography for the Internet of Things Masanobu Katagi and Shiho Moriai Sony Corporation

Add to Reading List

Source URL: www.iab.org

Language: English - Date: 2011-03-25 11:03:50
87Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2011-04-04 06:52:20
88Software / Internet protocols / Cryptographic protocols / IPsec / Microsoft CryptoAPI / Cryptlib / Cryptographic primitive / Kernel / Packet Processing / Computing / Cryptographic software / Cryptography

PDF Document

Add to Reading List

Source URL: openbsd.org

Language: English - Date: 2006-12-09 23:39:37
89Public-key cryptography / IEEE P1363 / ID-based encryption / IEEE Standards Association / Pairing / Proxy re-encryption / Institute of Electrical and Electronics Engineers / Cryptographic primitive / Signcryption / Cryptography / IEEE standards / Standards organizations

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-05-13 13:20:44
UPDATE