Encryption software

Results: 1087



#Item
11

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: web.cs.ucdavis.edu

- Date: 2004-02-12 14:18:41
    12

    An earlier version of this paper appears at Fast Software EncryptionFSEThe Software Performance of Authenticated-Encryption Modes Ted Krovetz∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    - Date: 2011-03-21 19:25:18
      13Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

      Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-02 21:42:44
      14Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

      Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

      Add to Reading List

      Source URL: fast.dpdk.org

      Language: English - Date: 2016-07-28 16:30:34
      15Software / Computing / BitTorrent / Concurrent computing / Goalbit / Peer-to-peer / Torrent file / Peer-to-Peer Assisted Streaming Solution / EMule / Ares Galaxy / BitTorrent protocol encryption / Torrent poisoning

      GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

      Add to Reading List

      Source URL: goalbit-solutions.com

      Language: English - Date: 2016-02-19 12:51:03
      16System software / Software / Disk encryption / Cryptography / Cryptographic software / Ransomware / Computer virus / Deception / Internet security / Encryption / Antivirus software / Linux.Encoder.1

      How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

      Add to Reading List

      Source URL: www.nomoreransom.org

      Language: English - Date: 2016-07-25 04:33:34
      17Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

      CP-G10i-Flyer-v10.fh-2 [Converted]

      Add to Reading List

      Source URL: www.cryptophone.de

      Language: English - Date: 2010-07-06 09:32:52
      18Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

      Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      19Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

      Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

      Add to Reading List

      Source URL: bacpuc.org.uk

      Language: English - Date: 2016-02-25 06:22:14
      20Disk encryption / Cryptography / Cryptographic software / Hardware-based full disk encryption / Advanced Encryption Standard / USB flash drive / USB / Encryption / BitLocker

      Microsoft Word - X-Wall DX_FAQ_v1.1.doc

      Add to Reading List

      Source URL: www.enovatech.net

      Language: English - Date: 2013-11-21 01:52:00
      UPDATE