「Encryption」の共起表現一覧(1語右で並び替え)

Encryption

1語右で並び替え

該当件数:197件

  • In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable fo
  • crypt files with a strong, readily available encryption algorithm such that a low percentage (1% - 0
  • on of the RSA Secret-Key Challenge, a 56-bit encryption algorithm that had a $10,000 USD prize avail
  • grapher at GCHQ who invented the widely-used encryption algorithm now commonly known as RSA, about t
  • in obscuring information about the choice of encryption algorithm if that information is freely avai
  • password being examined (including both the encryption algorithm and key), and comparing the output
  • Support for encryption algorithm AES, Twofish, Serpent, including t
  • It is an authenticated encryption algorithm designed to provide both data auth
  • Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977.
  • d, in 1973, what has become known as the RSA encryption algorithm, realising Ellis' idea.
  • g the theory that the code is a One-time pad encryption algorithm.
  • Many "home grown" encryption algorithms reveal the key quite easily when
  • cryptographic library that has all the usual encryption algorithms needed by information security so
  • You may choose from five different encryption algorithms (DES-64bit, 3DES-192bit, AES-256b
  • ng attacks are practical against a number of encryption algorithms, including RSA, ElGamal, and the
  • rch areas including mathematics, statistics, encryption algorithms, neural networks, geophysics and
  • example, required security tokens, supported encryption algorithms, and privacy rules) and how to as
  • SHA-1, SHA-256/392/512 etc.) and public key encryption algorithms.
  • s, distributed link tracking, and file-level encryption, also known as the Encrypting File System (E
  • ddy is a simple software application for the encryption and compression of computer files to make th
  • ned by aspects of WS-Security, including XML Encryption and XML Digital Signatures.
  • GP SDK which provides signing, verification, encryption, and decryption of files.
  • Internet users to trust one another through encryption and authentication.
  • ess keys can be protected by a wide range of encryption and hashing algorithms provided by the libgc
  • acking, budget management and tracking, file encryption, and investment portfolio management.
  • PDF support includes transparency, encryption and a large set of the PDF 1.4 spec as well
  • wn as web optimization or fast web viewing), encryption, and decryption of PDF files.
  • d 31 of the NLFSR state as its inputs during encryption and bits 0, 8, 19, 25 and 30 during decrypti
  • ion, WS-Security Signatures, and WS-Security Encryption and included Windows Keystore, Java Keystore
  • It specifically targets the weaknesses of LM encryption, and includes pre-computed data sufficient t
  • he bits of the NLFSR state (bits 0 and 16 on encryption and bits 31 and 15 on decryption) and with a
  • phers that support single pass authenticated encryption and can operate as collision-resistant hash
  • quipment such as network management systems, encryption and networking solutions for internet connec
  • tary of Defense for Policy, concentrating on encryption and information assurance issues.
  • They also handled encryption and decryption.
  • Protecting the stored values (e.g., using encryption and replicated storage).
  • ion uses a 64-bit block cipher algorithm for encryption and a proprietary compression algorithm.
  • r Apple Mail that provides public key e-mail encryption and signing.
  • Palcrypt is an open source single file encryption and decryption program.
  • The Pro version uses encryption and optional password protection to keep doc
  • FileVault-On the fly encryption and decryption of a user's home folder
  • virus control), personal firewall, antispam, encryption, antispyware, and parental control.
  • sp supports image checksumming, compression, encryption as well as integration with Splashy.
  • Ciright platform incorporates 512 bit encryption at the device level.
  • on of cryptsetup, using dm-crypt as the disk encryption backend.
  • published articles on Export Restrictions on Encryption became required reading at Harvard Law Schoo
  • If there is end-to-end encryption between the sender and the recipient, then n
  • imprinted with the programming code for RSA encryption, boasting "This shirt is a controlled muniti
  • rs/software developers and new users to file encryption by combining strong encryption methods and a
  • If there's additional encryption by SYSKEY in the imported SAM file (it's on
  • Opportunistic encryption can be used to combat passive wiretapping.
  • RSA Lab's 72-bit RC5 Encryption Challenge - In progress, 1.677% complete as
  • It is also known for a series of high-speed encryption co-processors, offloading this processor-int
  • ryffen manages to alter Starkey's Department encryption code, so Starkey is no longer on the run, an
  • rted features include resultset caching, SSL encryption, custom data source, dbShield
  • rates with Nautilus, gedit and Evolution for encryption, decryption and other operations.
  • his smart card, various cryptographic tasks ( encryption, decryption, digital signing/verification, a
  • torage features such as backup and recovery, encryption, deduplication and provisioning.
  • n scrambling system was a form of television encryption developed by Oak Industries in the early 198
  • ware is also used as part of the CryptoStick encryption device from Research Triangle Software, Inc.
  • Mechanical encryption devices such as Enigma made these attacks mu
  • ion with Andrew Viterbi to develop satellite encryption devices.
  • Voodoo's method of encryption encrypts all transfers of data from the prog
  • File Encryption encrypts files and folders to secure from un
  • PROE - x86-64 encryption engine
  • Enigma - German message encryption equipment.
  • IBM - IBM Database Encryption Expert uses Vormetric encryption technology
  • security support - SSL encryption, FIPS 140-2 validation, RACF, ACF2, LDAP
  • ouble Latte, Stock Options, Sea of Cubicles, Encryption, Firewall, El Camino Real, The Sysadmin, and
  • ection, intrusion prevention, email and file encryption, firewalls, VPNs, vulnerability, and scannin
  • The service makes use of AES encryption for security, and uses data compression and
  • nearly impossible to stop the use of strong encryption for telephone communications.
  • mpany announced that it would soon offer SSL encryption for search (although not enabled by default)
  • compliance and regulatory agencies requiring encryption for data at rest including, Health Insurance
  • Encryption for the Masses (E4M) is a free disk encrypti
  • All protocols offer OpenSSL encryption for additional security.
  • where E is the encryption function (cipher), and K1 and K2 are the two
  • SMEG is an acronym for Simulated Metamorphic Encryption Generator.
  • Fileystem encryption has certain advantages and disadvantages ove
  • oftware development to security, a number of encryption implementations and early static analysis to
  • It uses 256-bits AES encryption in order to encrypt messages, thus ensuring
  • blic Key Infrastructure (PKI) and the use of encryption, Internet governance, intellectual property
  • However, the key used for encryption is established using a Diffie-Hellmann Key E
  • easiest way to enable opportunistic website encryption is by using self-signed certificates, but th
  • This is used when encryption is not a practical solution or in tandem wit
  • As of June/2007, OpenPGP encryption is being implemented.
  • d its receiver and then attempt to crack the encryption key being used to secure wireless communicat
  • Control over the SSH encryption key and protocol version.
  • ission, which is to encrypt, using a digital encryption key, all the files it finds on computer driv
  • using the oracle's key, without knowing the encryption key.
  • This is not the only attack that allows encryption keys to be read from memory-for example, a D
  • tates S1, S2 and S3) is generally unsafe, as encryption keys will remain in the computer's memory, a
  • overy requirements for the use of asymmetric encryption keys for security and authenticated transact
  • ing down a computer will usually discard the encryption keys from memory.
  • only available to authorised users with the encryption keys.
  • 3) was a Swedish businessman and inventor of encryption machines.
  • pts of the sounds of cleartext printing from encryption machines.
  • This information might then reveal the encryption method used, some information about the encr
  • ntext file is created and encrypted with the encryption method under attack, such that the first cip
  • , a watermarking attack is an attack on disk encryption methods where the presence of a specially cr
  • , Blowfish, Twofish, CAST, and various other encryption methods.
  • ted using what was then the standard default encryption mode, CBC.
  • 4344, The Secure Shell (SSH) Transport Layer Encryption Modes
  • e wiretapper, on the other hand, can disrupt encryption negotiation to force an unencrypted channel.
  • ased access control to information, and full encryption of stored information and communications bet
  • ernet with computers aiding the users in the encryption of their interactions.
  • Yet, it does make the encryption of most internet traffic easy to implement,
  • the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primar
  • Alix proposed a controversial scheme for DRM encryption of BBC content, which was the subject of a 4
  • s such that each block depends on the proper encryption of the previous block.
  • cure communication improvements (signing and encryption of user-defined SOAP headers, Kerberos Secur
  • encryption of credit card information
  • Encryption of system and bootable partitions with pre-b
  • FOPE also offers policy-based encryption of email messages.
  • XML Digital Signature and encryption of Atom documents
  • RSA standard that governs the storage and encryption of private keys.
  • The channel also dropped its Videoguard encryption on Sky Digital on 1 July 2005, switching to
  • ing all the processing, mixing, encoding and encryption on the clients, relieving the servers and in
  • GCM encryption operation
  • vides great flexibility to the user with its encryption options.
  • a product, typically a device that performs encryption or secure transactions, is tampered with dur
  • r private or public anonymous proxy servers, encryption or even spoofing, diversion and obfuscation
  • eBook publishers, Baen flatly refused to use encryption or even Adobe's Portable Document Format (PD
  • obtaining a password (either by cracking the encryption, or through social engineering).
  • branch added support for encryption, peer exchange, binary prefix, and UPnP.
  • Building in Big Brother: The Encryption Policy Debate (Editor), Springer-Verlag, New
  • Scramdisk is a free OTFE (On-The-Fly Encryption) program for Windows 95, Windows 98 and Wind
  • BestCrypt is a commercial disk encryption program for Windows and Linux, developed by
  • also claims to have written an "unbreakable" encryption program, and made predictions for the year 2
  • It is similar in function to other disk encryption programs including Microsoft's BitLocker.
  • This weakness affected many disk encryption programs, including older versions of BestCr
  • the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and Davi
  • eta-documents include: posting of asymmetric encryption public keys, posting tokens that would be re
  • servers receives another share of K and the encryption result of M using the key K , E(M,K).
  • nformation which reduces the security of the encryption scheme.
  • hoosing the key length of the RSA public-key encryption scheme.
  • In fact, certain artificial signature and encryption schemes are known which are proven secure in
  • premium version of CRT with support for SSH encryption, SecureCRT later replaced the CRT product en
  • It is a form of disk encryption software similar to Microsoft's Encrypting F
  • While most disk encryption software implements different and incompatib
  • atible with containers used by SecuBox (disk encryption software by Aiko Solutions)
  • Disk encryption software (also known as OTFE software)
  • the government for permission to publish his encryption software, Snuffle, and a paper describing it
  • He worked for Network Associates on the PGP encryption software, is a member of the Shmoo Group, a
  • he US government allows the export of 56-bit encryption software, and stronger encryption software f
  • Cryptophane is a GUI frontend for the GnuPG encryption software.
  • Mobile encryption solution
  • Unlike other Linux encryption solutions such as dm-crypt, eCryptfs uses Fi
  • , 2010: Acquired Mobile Armor; an innovative encryption specialist based in St. Louis, Missouri, USA
  • The Advanced Encryption Standard algorithm (AES - derived from the R
  • er, which was a finalist for NIST's Advanced Encryption Standard competition (with Bruce Schneier, J
  • to the development process for the Advanced Encryption Standard (AES)."
  • Advanced Encryption Standard (AES) was established by National I
  • ipher which was a candidate for the Advanced Encryption Standard, and he is one of the designers of
  • gn of LOKI and the cryptanalysis of the Data Encryption Standard.
  • hat two advanced features, disk-spanning and encryption, still require PKZIP.
  • dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and l
  • TLS, OpenPGP and end-to-end encryption support (OpenPGP not available under Windows
  • Compression and Encryption Support.
  • It was revealed that the Xtraview Encryption System used to encrypt Red Hot could be bypa
  • SecureIM is an encryption system built into the Trillian Instant Messe
  • This encryption system was discontinued by the mid-1990s in
  • t was the first open source transparent disk encryption system to support Windows Vista and PDAs.
  • ng several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard e
  • If two parties use an encryption system, which encrypts a message M of length
  • Most disk encryption systems overwrite their cached encryption ke
  • 1960s-era encryption systems often included a punched card reader
  • er Areas, and A Discussion About Modern Disk Encryption Systems.
  • plained that once the extension and filename encryption tables are known, restoration is possible.
  • Encryption technologies
  • 8 contained sophisticated communications and encryption technology, and because portions of the debr
  • wer trace from a smart card performing a DES encryption, the sixteen rounds can be seen clearly.
  • novated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window Sy
  • ration, such as XTS, LRW and ESSIV (see disk encryption theory), in order to avoid watermarking atta
  • f who downloads or shares files, with strong encryption to resist traffic sniffing.
  • For coding for DRGs first encryption to the valid version of the ICD-10-GM is (cu
  • tions, keeps no logs and uses military-grade encryption to protect sources and other confidential in
  • , which uses cloud computing and 128-bit SSL encryption to enable users to send and receive large da
  • DirecTV transmits programming with encryption to mitigate signal piracy.
  • Some users of GmailFS use filesystem-level encryption to protect the information they store with i
  • GnuPG: the core; this is the actual encryption tool
  • les comprise logging functionality, Blowfish encryption, user and channel management, away functiona
  • ate, then uses this state to perform a block encryption using part of the key, and uses the result o
  • FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encry
  • In addition the encryption using the AES 128 standard has been introduc
  • er's logon secrets, or in the case of system encryption, using the system's domain authentication se
  • Optional archive encryption using AES (Advanced Encryption Standard) wit
  • End-to-end encryption using a combination of Blowfish and RSA algo
  • upports a unique type of system for wireless encryption using the powerful wpa supplicant.
  • esented in the paper Fast Hashing and Stream Encryption with PANAMA on the Fast Software Encryption
  • I, and cloud storage), data compression, and encryption, with specific support for Microsoft SharePo
  • GPG Encryption with Kryptonite plugin
  • communication encryption with AES, serpent, CAST-256, IDEA or Blowfis
  • Instant messaging encryption with Off-the-Record Messaging
  • CLEARAID automatically reversed the encryption without having to contact the extortionist.
  • it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first publis