RSA Security

Results: 682



#Item
41Public-key cryptography / Public key infrastructure / RSA / Schmidt-Samoa cryptosystem

Answers to Practice Questions for Exam 1 (Crypto Basics) Answer 1-Crypto: a) The three basic requirements that we discussed in class are: 1. Cryptosystem security: Roughly speaking, it must be infeasible for an eavesdrop

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-10-15 14:07:47
42ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
43Paillier cryptosystem / RSA / Semantic security / XTR

LNCSAn Adaptively Secure Mix-Net Without Erasures

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:48:38
44Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
45Symmetric-key algorithm / RSA / Security Target / Evaluation / Common Criteria / Advanced Encryption Standard / FIPS 140-2

centercenterSupporting Document Mandatory Technical Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:10
46EMC Corporation / RSA Security / SAP SE / Business requirements / Reseller / Program management / RSA

PROGRAM GUIDE INTRODUCTION SECURWORLD

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-28 11:59:21
47EMC Corporation / E-commerce / Identity theft / Crimes / Deception / RSA Security / RSA / Fraud / Internet fraud / Authentication / Computer security

RSA eFraudNetwork Proactive Fraud Protection ® TM

Add to Reading List

Source URL: www.ndm.net

Language: English - Date: 2013-09-30 12:31:49
48Public-key cryptography / Cryptography / Public key infrastructure / Encryption / Attribute-based encryption / PKE / Digital signature / Side-channel attack / RSA

Hello everybody ! See you at the next conference!

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
49Risk / Actuarial science / Security / Auditing / Management / Risk management / Operational risk / Internal audit / Enterprise risk management / Governance /  risk management /  and compliance

RSA Archer Risk Intelligence Index

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 12:45:17
50EMC Corporation / System administration / Secure communication / RSA SecurID / Downtime / Data center / Computer security / RSA Security

Hosting Checklist If you have a requirement that you do not see on the list, or if you have questions, please send an email to Servers mirrored across geographically separate data centers to ensure co

Add to Reading List

Source URL: www.ariessys.com

Language: English - Date: 2015-10-19 13:59:31
UPDATE