Encryption by date

Results: 7



#Item
1Cryptography / Taxation in the United States / Social Security / Universal identifiers / Social Security number / Encryption / Computer security

Protection of SSNs Procedure Effective Date: Purpose: This procedure will ensure the protection and confidentiality of Social Security Numbers used by the Department of Labor and Industry (DLI). This procedure

Add to Reading List

Source URL: serve.mt.gov

Language: English - Date: 2014-12-12 15:10:39
2Block cipher / Q / Finite fields / XSL attack / Encryption by date / Cryptography / Advanced Encryption Standard / Polynomial

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-20 03:30:14
3Secure communication / Data Encryption Standard / Cryptographic protocols / Secure Shell / Transport Layer Security / Wireless security / Key size / Telnet / Advanced Encryption Standard / Cryptography / Internet standards / Internet protocols

DRAFT Standard Statement – Encryption Title: Encryption Standard Document Number: SS[removed]Effective Date: xx/xx/2011 Published by: Department of Information Systems 1. Purpose

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:14
4Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
5SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
6Advanced Encryption Standard / MISTY1 / Triple DES / Block cipher / Horst Feistel / Feistel / Differential cryptanalysis / Camellia / Encryption by date / Cryptography / Data Encryption Standard / Feistel cipher

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
7Block cipher / Cryptanalysis / Feistel cipher / Key schedule / Tiny Encryption Algorithm / Index of cryptography articles / Encryption by date / Cryptography / CIPHERUNICORN-A / CIPHERUNICORN-E

A Cryptographic Review of Cipherunicorn-E

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
UPDATE