Found 188 results for 'integrity'.
1) integrity - Does LUKS protect the filesystem integrity?
2) hash - Tripwire - Is it security Theater?
3) linux - Comparing two Linux system clones - what about non-regular files?
4) integrity - What prevents the Intel TXT boot loader from being maliciously altered?
5) tls - Can the server detect when a client has disabled certificate pinning?
6) block-cipher - Practical uses of Manipulation Detection Code (MDC) and IGE
7) integrity - For intrusion detection, tripwire, using crypto hash integrity checking - what can be expected?
8) authenticated-encryption - Robust authentication and integrity for short OTP message
9) encryption - Should the identity of a sender be verified using additional means, or does a MAC suffice?
10) authentication - Is using ECDSA with AES-GCM viable?
11) rsa - RSA key length choice for TLS when confidentiality not important?
12) secret-sharing - What's the functional difference between fountain codes and polynomial secret sharing?
13) hash - Checking a file for integrity and authentication
14) signature - PKCS#7 signed data structure in signed PDF document
15) windows - Something is changing my hosts file without asking
16) signature - What are the different uses of MAC and Digital Signature?
17) mac - Advantages/disadvantages of different message numbering schemes
18) stream-cipher - Recommended authenticated stream cipher for minimum overhead?
19) rsa - What does encryption with RSA public key provide?
20) encryption - Information security evaluation
21) encryption - Securing client-side data from users
22) web-browser - How does subresource integrity actually help?
23) web-application - How to validate the integrity of a back end?
24) integrity - How reassuring is CRC-then-XTS as authenticated encryption?
25) authentication - Encrypt-then-MAC paradigm
26) encryption - How do I transfer the HMAC?
27) authentication - Definition of authenticity
28) encryption - How to provide integrity even though using Authenticated Encryption?
29) public-key-infrastructure - Data Integrity in PKCs
30) authenticated-encryption - How to enforce data privacy, integrity and authenticity of distributed firmware images for an embedded device?
31) tls - What is the impact of a server not fully verifying the data in the Client Finished packet of a TLS connection?
32) tls - Is there a way to inercept encrypted https connections by mimicking a cert authority?
33) hash - What is the practical use of MDC
34) aes - TLS 1.2 Cipher Suites With AES-GCM – What data (if any) is passed to the AES-GCM cipher as the Additional Authentication Data?
35) rsa - How to verify the integrity of RSA encrypted messages?
36) hash - Are there better alternatives to CRC32 for distributed download components hash calculation?
37) encryption - Security issues of a MAC-then-Encrypt-then-MAC approach?
38) hash - Does it matter if I publish only publish good or bad MD5 hashes after recovering from a hack?
39) zero-knowledge-proofs - Quantum secure algorithms
40) authentication - Properties provided by GCM
41) aes - How do AES and DES ensure data integrity?
42) encryption - Is message integrity possible without confidentiality? Are there any mainstream protocols?
43) tls - Does SSL/TLS (https) hide the urls being accessed
44) hash - How to securely hash sensitive data and make the hash public, while preventing an attack by someone who know the structure or some part of the data?
45) authentication - Difference between authentication, integrity and data origin authentication
46) stream-cipher - Can ChaCha20 provide integrity?
47) integrity - Which tamper-protection algorithm provides the shortest output?
48) integrity - integrity and consistency
49) tls - Why would a website serve different versions of a file over HTTP and HTTPS?
50) cryptography - Why is it impossible to verify whether a file has been modified since creation?