Data encryption (Computer science)
Label
Data encryption (Computer science)
Name
Data encryption (Computer science)
Actions
Incoming Resources
- Subject of37
- Cryptographic algorithms and key sizes for Personal Identity Verification, W. Timothy Polk, Donna F. Dodson, William E. Burr
- Recommendation for block cipher modes of operation, Galois/Counter mode (GCM) for confidentiality and authentication, Morris Dworkin
- A statistical test suite for random and pseudorandom number generators for cryptographic applications, Andrew Rukhin ... [and others]
- Learn blockchain by building one, a concise path to understanding cryptocurrencies, Daniel van Flymen
- Introduction to identity-based encryption, Luther Martin
- Securing record communications, the TSEC/KW-26, Melville Klein
- Recommendation for pair-wise key establishment schemes using integer factorization cryptography, Elaine Barker ... [and others]
- Encryption and evolving technology, implications for U.S. law enforcement investigations, Kristin Finklea
- Cryptography, Sean-Philip Oriyano
- Blockchain, by Tiana Laurence
- Blockchain, the insights you need from Harvard Business Review
- Implementation of spread spectrum image steganography, Frederick S. Brundick and Lisa M. Marvel
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, (revised), Elaine Baker, Don Johnson, and Miles Smid
- Blockchain Basics, a Non-Technical Introduction in 25 Steps
- Privacy and security online, best practices for cybersecurity, Nicole Hennig
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, Elaine Baker, Don Johnson, and Miles Smid
- Intelligence and counterintelligence:, cryptography : cracking codes
- Recommendation for block cipher modes of operation, the CMAC mode for authentication, Morris Dworkin
- Recommendation for block cipher modes of operation, the CCM mode for authentication and confidentiality, Morris Dworkin
- The numbers station, Content Media Corporation, Echo Lake Entertainment present in association with Piccadilly Pictures and Atlantic Swiss Productions and Blue Lake Media Fund a Furst Films and Matador Pictures production ; produced by Sean Furst, Bryan Thomas and Nigel Thomas ; screenplay by F. Scott Frazier ; directed by Kasper Barfoed
- Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher, William C. Barker
- Evaluation of the SEC encryption program
- The keyed-hash message authentication code (HMAC)
- The keyed-hash message authentication code (HMAC)
- Mobile computing, securing your workforce
- Cryptography for dummies, by Chey Cobb
- Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher, William C. Barker
- Understand, Manage, and Prevent Algorithmic Bias, a Guide for Business Users and Data Scientists
- Video encryption technology and application, Zhengquan Xu and Jing Sun
- Evaluation of the SEC encryption program
- Recommendation for block cipher modes of operation, methods and techniques, Morris Dworkin
- Recommendation for pair-wise key establishment schemes, using integer factorization cryptography, Elaine Baker ... [and others]
- Rise of the hackers, produced and directed by Kate Dart ; produced for Nova by BBC
- Cryptography, the key to digital security, how it works, and why it matters, Keith Martin
- Recommendation for block cipher modes of operation, Galois/Counter mode (GCM) and GMAC, Morris Dworkin
- Blockchain and the law, the rule of code, Primavera De Filippi and Aaron Wright
- Cryptographic algorithms and key sizes for personal identity verification, W. Timothy Polk, Donna F. Dodson, William E. Burr