「encryption」の共起表現一覧(1語右で並び替え)
該当件数 : 197件
In cryptography, the Tiny | Encryption Algorithm (TEA) is a block cipher notable fo |
crypt files with a strong, readily available | encryption algorithm such that a low percentage (1% - 0 |
on of the RSA Secret-Key Challenge, a 56-bit | encryption algorithm that had a $10,000 USD prize avail |
grapher at GCHQ who invented the widely-used | encryption algorithm now commonly known as RSA, about t |
in obscuring information about the choice of | encryption algorithm if that information is freely avai |
password being examined (including both the | encryption algorithm and key), and comparing the output |
Support for | encryption algorithm AES, Twofish, Serpent, including t |
It is an authenticated | encryption algorithm designed to provide both data auth |
Shamir and Leonard Adleman developed the RSA | encryption algorithm in 1977. |
d, in 1973, what has become known as the RSA | encryption algorithm, realising Ellis' idea. |
g the theory that the code is a One-time pad | encryption algorithm. |
Many "home grown" | encryption algorithms reveal the key quite easily when |
cryptographic library that has all the usual | encryption algorithms needed by information security so |
You may choose from five different | encryption algorithms (DES-64bit, 3DES-192bit, AES-256b |
ng attacks are practical against a number of | encryption algorithms, including RSA, ElGamal, and the |
rch areas including mathematics, statistics, | encryption algorithms, neural networks, geophysics and |
example, required security tokens, supported | encryption algorithms, and privacy rules) and how to as |
SHA-1, SHA-256/392/512 etc.) and public key | encryption algorithms. |
s, distributed link tracking, and file-level | encryption, also known as the Encrypting File System (E |
ddy is a simple software application for the | encryption and compression of computer files to make th |
ned by aspects of WS-Security, including XML | Encryption and XML Digital Signatures. |
GP SDK which provides signing, verification, | encryption, and decryption of files. |
Internet users to trust one another through | encryption and authentication. |
ess keys can be protected by a wide range of | encryption and hashing algorithms provided by the libgc |
acking, budget management and tracking, file | encryption, and investment portfolio management. |
PDF support includes transparency, | encryption and a large set of the PDF 1.4 spec as well |
wn as web optimization or fast web viewing), | encryption, and decryption of PDF files. |
d 31 of the NLFSR state as its inputs during | encryption and bits 0, 8, 19, 25 and 30 during decrypti |
ion, WS-Security Signatures, and WS-Security | Encryption and included Windows Keystore, Java Keystore |
It specifically targets the weaknesses of LM | encryption, and includes pre-computed data sufficient t |
he bits of the NLFSR state (bits 0 and 16 on | encryption and bits 31 and 15 on decryption) and with a |
phers that support single pass authenticated | encryption and can operate as collision-resistant hash |
quipment such as network management systems, | encryption and networking solutions for internet connec |
tary of Defense for Policy, concentrating on | encryption and information assurance issues. |
They also handled | encryption and decryption. |
Protecting the stored values (e.g., using | encryption and replicated storage). |
ion uses a 64-bit block cipher algorithm for | encryption and a proprietary compression algorithm. |
r Apple Mail that provides public key e-mail | encryption and signing. |
Palcrypt is an open source single file | encryption and decryption program. |
The Pro version uses | encryption and optional password protection to keep doc |
FileVault-On the fly | encryption and decryption of a user's home folder |
virus control), personal firewall, antispam, | encryption, antispyware, and parental control. |
sp supports image checksumming, compression, | encryption as well as integration with Splashy. |
Ciright platform incorporates 512 bit | encryption at the device level. |
on of cryptsetup, using dm-crypt as the disk | encryption backend. |
published articles on Export Restrictions on | Encryption became required reading at Harvard Law Schoo |
If there is end-to-end | encryption between the sender and the recipient, then n |
imprinted with the programming code for RSA | encryption, boasting "This shirt is a controlled muniti |
rs/software developers and new users to file | encryption by combining strong encryption methods and a |
If there's additional | encryption by SYSKEY in the imported SAM file (it's on |
Opportunistic | encryption can be used to combat passive wiretapping. |
RSA Lab's 72-bit RC5 | Encryption Challenge - In progress, 1.677% complete as |
It is also known for a series of high-speed | encryption co-processors, offloading this processor-int |
ryffen manages to alter Starkey's Department | encryption code, so Starkey is no longer on the run, an |
rted features include resultset caching, SSL | encryption, custom data source, dbShield |
rates with Nautilus, gedit and Evolution for | encryption, decryption and other operations. |
his smart card, various cryptographic tasks ( | encryption, decryption, digital signing/verification, a |
torage features such as backup and recovery, | encryption, deduplication and provisioning. |
n scrambling system was a form of television | encryption developed by Oak Industries in the early 198 |
ware is also used as part of the CryptoStick | encryption device from Research Triangle Software, Inc. |
Mechanical | encryption devices such as Enigma made these attacks mu |
ion with Andrew Viterbi to develop satellite | encryption devices. |
Voodoo's method of | encryption encrypts all transfers of data from the prog |
File | Encryption encrypts files and folders to secure from un |
PROE - x86-64 | encryption engine |
Enigma - German message | encryption equipment. |
IBM - IBM Database | Encryption Expert uses Vormetric encryption technology |
security support - SSL | encryption, FIPS 140-2 validation, RACF, ACF2, LDAP |
ouble Latte, Stock Options, Sea of Cubicles, | Encryption, Firewall, El Camino Real, The Sysadmin, and |
ection, intrusion prevention, email and file | encryption, firewalls, VPNs, vulnerability, and scannin |
The service makes use of AES | encryption for security, and uses data compression and |
nearly impossible to stop the use of strong | encryption for telephone communications. |
mpany announced that it would soon offer SSL | encryption for search (although not enabled by default) |
compliance and regulatory agencies requiring | encryption for data at rest including, Health Insurance |
Encryption for the Masses (E4M) is a free disk encrypti | |
All protocols offer OpenSSL | encryption for additional security. |
where E is the | encryption function (cipher), and K1 and K2 are the two |
SMEG is an acronym for Simulated Metamorphic | Encryption Generator. |
Fileystem | encryption has certain advantages and disadvantages ove |
oftware development to security, a number of | encryption implementations and early static analysis to |
It uses 256-bits AES | encryption in order to encrypt messages, thus ensuring |
blic Key Infrastructure (PKI) and the use of | encryption, Internet governance, intellectual property |
However, the key used for | encryption is established using a Diffie-Hellmann Key E |
easiest way to enable opportunistic website | encryption is by using self-signed certificates, but th |
This is used when | encryption is not a practical solution or in tandem wit |
As of June/2007, OpenPGP | encryption is being implemented. |
d its receiver and then attempt to crack the | encryption key being used to secure wireless communicat |
Control over the SSH | encryption key and protocol version. |
ission, which is to encrypt, using a digital | encryption key, all the files it finds on computer driv |
using the oracle's key, without knowing the | encryption key. |
This is not the only attack that allows | encryption keys to be read from memory-for example, a D |
tates S1, S2 and S3) is generally unsafe, as | encryption keys will remain in the computer's memory, a |
overy requirements for the use of asymmetric | encryption keys for security and authenticated transact |
ing down a computer will usually discard the | encryption keys from memory. |
only available to authorised users with the | encryption keys. |
3) was a Swedish businessman and inventor of | encryption machines. |
pts of the sounds of cleartext printing from | encryption machines. |
This information might then reveal the | encryption method used, some information about the encr |
ntext file is created and encrypted with the | encryption method under attack, such that the first cip |
, a watermarking attack is an attack on disk | encryption methods where the presence of a specially cr |
, Blowfish, Twofish, CAST, and various other | encryption methods. |
ted using what was then the standard default | encryption mode, CBC. |
4344, The Secure Shell (SSH) Transport Layer | Encryption Modes |
e wiretapper, on the other hand, can disrupt | encryption negotiation to force an unencrypted channel. |
ased access control to information, and full | encryption of stored information and communications bet |
ernet with computers aiding the users in the | encryption of their interactions. |
Yet, it does make the | encryption of most internet traffic easy to implement, |
the Data Protection API can enable symmetric | encryption of any kind of data; in practice, its primar |
Alix proposed a controversial scheme for DRM | encryption of BBC content, which was the subject of a 4 |
s such that each block depends on the proper | encryption of the previous block. |
cure communication improvements (signing and | encryption of user-defined SOAP headers, Kerberos Secur |
encryption of credit card information | |
Encryption of system and bootable partitions with pre-b | |
FOPE also offers policy-based | encryption of email messages. |
XML Digital Signature and | encryption of Atom documents |
RSA standard that governs the storage and | encryption of private keys. |
The channel also dropped its Videoguard | encryption on Sky Digital on 1 July 2005, switching to |
ing all the processing, mixing, encoding and | encryption on the clients, relieving the servers and in |
GCM | encryption operation |
vides great flexibility to the user with its | encryption options. |
a product, typically a device that performs | encryption or secure transactions, is tampered with dur |
r private or public anonymous proxy servers, | encryption or even spoofing, diversion and obfuscation |
eBook publishers, Baen flatly refused to use | encryption or even Adobe's Portable Document Format (PD |
obtaining a password (either by cracking the | encryption, or through social engineering). |
branch added support for | encryption, peer exchange, binary prefix, and UPnP. |
Building in Big Brother: The | Encryption Policy Debate (Editor), Springer-Verlag, New |
Scramdisk is a free OTFE (On-The-Fly | Encryption) program for Windows 95, Windows 98 and Wind |
BestCrypt is a commercial disk | encryption program for Windows and Linux, developed by |
also claims to have written an "unbreakable" | encryption program, and made predictions for the year 2 |
It is similar in function to other disk | encryption programs including Microsoft's BitLocker. |
This weakness affected many disk | encryption programs, including older versions of BestCr |
the first cryptanalyses of the WEP wireless | encryption protocol together with Ian Goldberg and Davi |
eta-documents include: posting of asymmetric | encryption public keys, posting tokens that would be re |
servers receives another share of K and the | encryption result of M using the key K , E(M,K). |
nformation which reduces the security of the | encryption scheme. |
hoosing the key length of the RSA public-key | encryption scheme. |
In fact, certain artificial signature and | encryption schemes are known which are proven secure in |
premium version of CRT with support for SSH | encryption, SecureCRT later replaced the CRT product en |
It is a form of disk | encryption software similar to Microsoft's Encrypting F |
While most disk | encryption software implements different and incompatib |
atible with containers used by SecuBox (disk | encryption software by Aiko Solutions) |
Disk | encryption software (also known as OTFE software) |
the government for permission to publish his | encryption software, Snuffle, and a paper describing it |
He worked for Network Associates on the PGP | encryption software, is a member of the Shmoo Group, a |
he US government allows the export of 56-bit | encryption software, and stronger encryption software f |
Cryptophane is a GUI frontend for the GnuPG | encryption software. |
Mobile | encryption solution |
Unlike other Linux | encryption solutions such as dm-crypt, eCryptfs uses Fi |
, 2010: Acquired Mobile Armor; an innovative | encryption specialist based in St. Louis, Missouri, USA |
The Advanced | Encryption Standard algorithm (AES - derived from the R |
er, which was a finalist for NIST's Advanced | Encryption Standard competition (with Bruce Schneier, J |
to the development process for the Advanced | Encryption Standard (AES)." |
Advanced | Encryption Standard (AES) was established by National I |
ipher which was a candidate for the Advanced | Encryption Standard, and he is one of the designers of |
gn of LOKI and the cryptanalysis of the Data | Encryption Standard. |
hat two advanced features, disk-spanning and | encryption, still require PKZIP. |
dm-crypt is a transparent disk | encryption subsystem in Linux kernel versions 2.6 and l |
TLS, OpenPGP and end-to-end | encryption support (OpenPGP not available under Windows |
Compression and | Encryption Support. |
It was revealed that the Xtraview | Encryption System used to encrypt Red Hot could be bypa |
SecureIM is an | encryption system built into the Trillian Instant Messe |
This | encryption system was discontinued by the mid-1990s in |
t was the first open source transparent disk | encryption system to support Windows Vista and PDAs. |
ng several ways to circumvent the VideoCrypt | encryption system, most notably the Season7 smartcard e |
If two parties use an | encryption system, which encrypts a message M of length |
Most disk | encryption systems overwrite their cached encryption ke |
1960s-era | encryption systems often included a punched card reader |
er Areas, and A Discussion About Modern Disk | Encryption Systems. |
plained that once the extension and filename | encryption tables are known, restoration is possible. |
Encryption technologies | |
8 contained sophisticated communications and | encryption technology, and because portions of the debr |
wer trace from a smart card performing a DES | encryption, the sixteen rounds can be seen clearly. |
novated in a variety of areas, including RSA | encryption, the spreadsheet, the NuBus, the X Window Sy |
ration, such as XTS, LRW and ESSIV (see disk | encryption theory), in order to avoid watermarking atta |
f who downloads or shares files, with strong | encryption to resist traffic sniffing. |
For coding for DRGs first | encryption to the valid version of the ICD-10-GM is (cu |
tions, keeps no logs and uses military-grade | encryption to protect sources and other confidential in |
, which uses cloud computing and 128-bit SSL | encryption to enable users to send and receive large da |
DirecTV transmits programming with | encryption to mitigate signal piracy. |
Some users of GmailFS use filesystem-level | encryption to protect the information they store with i |
GnuPG: the core; this is the actual | encryption tool |
les comprise logging functionality, Blowfish | encryption, user and channel management, away functiona |
ate, then uses this state to perform a block | encryption using part of the key, and uses the result o |
FreeOTFE originally offered | encryption using cipher-block chaining (CBC) with encry |
In addition the | encryption using the AES 128 standard has been introduc |
er's logon secrets, or in the case of system | encryption, using the system's domain authentication se |
Optional archive | encryption using AES (Advanced Encryption Standard) wit |
End-to-end | encryption using a combination of Blowfish and RSA algo |
upports a unique type of system for wireless | encryption using the powerful wpa supplicant. |
esented in the paper Fast Hashing and Stream | Encryption with PANAMA on the Fast Software Encryption |
I, and cloud storage), data compression, and | encryption, with specific support for Microsoft SharePo |
GPG | Encryption with Kryptonite plugin |
communication | encryption with AES, serpent, CAST-256, IDEA or Blowfis |
Instant messaging | encryption with Off-the-Record Messaging |
CLEARAID automatically reversed the | encryption without having to contact the extortionist. |
it was first presented at the Fast Software | Encryption workshop in Leuven in 1994, and first publis |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |