Xem 1-20 trên 338 kết quả Encryption
  • Folder Encryption 4.6: Mã hóa thư mục và có thể dùng trên mọi máy , Đa số các phần mềm mã hóa tập tin, thư mục đều chỉ có

    doc1p saodem009 27-09-2010 118 14   Download

  • Tham khảo luận văn - đề án 'luận văn: nghiên cứu giải thuật advanced encryption standard mã hóa các văn bản mật tại trường cao đẳng công kỹ nghệ đông á', luận văn - báo cáo, thạc sĩ - tiến sĩ - cao học phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf13p esc_12 03-08-2013 46 14   Download

  • Block ciphers are among the most widely used types of cryptographic algorithms provide secrecy and/or authentication services in particular will introduce DES (Data Encryption Standard)

    ppt40p muathu_102 28-01-2013 24 4   Download

  • Classified along three independent dimensions: The type of operations used for transforming plaintext to ciphertext The number of keys used symmetric (single key) asymmetric (two-keys, or public-key encryption) The way in which the plaintext is processed

    ppt26p muathu_102 28-01-2013 29 4   Download

  • Announcing the Advanced encryption standard (AES) may be used by federal departments and agencies when an agency determines that sensitive (unclassified) information (as defined in p. l. 100 235) requires cryptographic protection.


    pdf51p bmayltt 09-05-2015 21 3   Download

  • Bài giảng Bảo mật hệ thống thông tin: Chương 4 - Data Encryption Standard và Advanced Encryption Standard bao gồm những nội dung về mã hóa tích; quy trình mã hóa theo khối; Data Encryption Standard; thuật toán bảo mật DS; quy trình của thuật toán DES và một số nội dung khác.

    pdf31p cocacola_09 23-11-2015 16 3   Download

  • Any message written over a fixed set of symbols can be represented as a binary string (a sequence of 0's and 1's) Binary digits 0 and 1 are called bits To reduce computation overhead, encryption algorithms should only use operations that are easy to implement For a binary string X: The length of X, denoted by |X|, is the number of bits in X If |X| = l, X is an l-bit binary string Let a be a binary bit and k a non-negative integer. Denote by ak a binary string consisting of k copies of a Denote the concatenation of X and Y by XY or...

    ppt25p muathu_102 28-01-2013 20 2   Download

  • Lattices have been studied by cryptographers for quite some time, in both the field of cryptanalysis and as a source of hard problems on which to build encryption schemes. In this lecture, we describe the NTRU encryption algorithm, and the lattice problems on which this is based.

    pdf31p dunglh2013 02-04-2014 28 0   Download

  • This how-to will show you a method for building a USB thumb drive with the following features: Persistent Changes – Files saved and changes made will be kept across reboots. Nessus and NessusClient installed – Everybody needs Nessus Encryption configured (Note: This is not whole drive encryption) We will also tweak a few things and make some interesting changes.

    pdf14p itphongphu 24-11-2010 141 55   Download

  • Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Management Reform Act of 1996 (Public Law 104-106) and the Computer Security Act of 1987 (Public Law 100-235).

    pdf51p nguyen2 10-11-2009 120 34   Download

  • Since this course is an introduction to encryption, we should cover what it is. Cryptography means “hidden writing”, and various forms of hidden writing have been used throughout history. One of the main goals of cryptography is to communicate with another party in such a way that if anyone else is listening, they cannot understand what you are saying. So, in its most basic form cryptography garbles text in such a way that anyone that intercepts the message cannot understand it.

    pdf33p huyhoang 08-08-2009 181 26   Download

  • This module explains to students how to strengthen the security of their Web applications by incorporating the programmatic use of cryptography. Depending on the programming platform, students will use one of several cryptographic libraries to add encryption, hashing, and digital signing functionality to their Web application. After completing this module, students will be able to use the CAPICOM cryptographic library and the System.Security.Cryptography namespace to encrypt, hash, and sign data....

    pdf78p maiphuong 10-08-2009 78 18   Download

  • This is the second of two of the most important classes we have the privilege to teach as part of the SANS Security Essentials course. In the first course, we went on a quick tour of some of the important issues and concepts in the field of cryptography. We saw that encryption is real, it is crucial, it is a foundation of so much that happens in the world around us today --and, most of it in a manner that is completely transparent to us.

    pdf29p huyhoang 07-08-2009 89 17   Download

  • Bài giảng Kỹ thuật mã hóa (Encryption) cung cấp cho bạn đọc các nội dung căn bản về mã hóa như: Khái niệm, phân loại, các giải thuật mã hóa, tiêu chuẩn và các giao thức về mã hóa,... Mời các bạn cùng tham khảo để nắm bắt các nội dung chi tiết.

    ppt50p namthangtinhlang_00 31-10-2015 37 16   Download

  • AES In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Register in December 2001. The criteria defined by NIST for selecting AES fall into three areas: 1. Security 2. Cost 3. Implementation.

    pdf8p vovantien_2 05-12-2012 39 8   Download

  • Universidade Federal de Itajubá – UNIFEI Itajubá - Brazil Abstract – This article describes the core implementation of an Advanced Encryption Standard - AES in Field Programmable Gate Array - FPGA. The core was implemented in both Xilinx Spartan-3 and Xilinx Virtex-5 FPGAs. The algorithm was implemented for 128 bits word and key. The implementation was very efficient, achieving 318MHz on a Xilinx Spartan-3, representing at 50% faster than other reported works. The implementation can achieve 800MHz on a Xilinx Virtex-5.

    pdf6p hacmailau 03-09-2012 61 7   Download

  • Máy tính cá nhân, là cách gọi cho hầu hết các máy tính. Tuy nhiên trên thực tế chúng ta phải chia sẻ máy tính của mình nhiều người khác. Các tập tin cá nhân của chúng ta không tránh khỏi con mắt tò mò của người khác, có thể đó là bí mật của bạn và sẽ không còn bí mật nữa nếu họ mở chúng và tìm hiểu bí mật của bạn. Mã hóa tập tin là cách tốt nhất để giữ các tập tin cá nhân khỏi sự tò mò của người khác nếu họ sử dụng...

    pdf5p coeus75 14-01-2013 31 6   Download

  • Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.

    pdf11p levuphongqn 18-08-2015 14 5   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domai

    pdf13p dauphong15 18-02-2012 21 4   Download

  • key concerns are confidentiality and timeliness to provide confidentiality must encrypt identification and session key info which requires the use of previously shared private or public keys need timeliness to prevent replay attacks provided by using sequence numbers or timestamps or challenge/response

    ppt24p muathu_102 28-01-2013 21 4   Download


Đồng bộ tài khoản