Zen (first generation) (redirect from Secure Memory Encryption)
AMD's Secure Memory Encryption (SME) and AMD's Secure Encrypted Virtualization (SEV). Secure Memory Encryption is real-time memory encryption done per...
63 KB (6,122 words) - 01:47, 15 May 2025
Data in use (section Full memory encryption)
AMD has a Secure Memory Encryption (SME) feature introduced in 2017 with Epyc. Intel has promised to deliver its Total Memory Encryption (TME) feature...
7 KB (894 words) - 23:15, 23 March 2025
Cold boot attack (redirect from Full memory encryption)
finding attacks. Since cold boot attacks target random-access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective...
38 KB (4,273 words) - 16:09, 11 June 2025
Transport Layer Security (redirect from Transport layer encryption)
public encryption key. The client confirms the validity of the certificate before proceeding. To generate the session keys used for the secure connection...
178 KB (17,519 words) - 14:08, 10 June 2025
bus encryption. Data processed by a cryptoprocessor is also frequently encrypted. The Trusted Platform Module (TPM) is an implementation of a secure cryptoprocessor...
18 KB (1,968 words) - 11:12, 10 May 2025
BitLocker (redirect from Bitlocker Drive Encryption)
volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for...
37 KB (3,534 words) - 03:51, 24 April 2025
Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited, Micron...
15 KB (1,788 words) - 05:38, 5 March 2025
a high school in the Shawnee Mission School District in Kansas Secure Memory Encryption, an AMD technology Structure mapping engine, in artificial intelligence...
2 KB (229 words) - 04:50, 7 November 2024
Symmetric-key algorithm (redirect from Symmetric encryption)
algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
15 KB (1,540 words) - 19:12, 22 April 2025
Bus encryption is the use of encrypted program instructions on a data bus in a computer that includes a secure cryptoprocessor for executing the encrypted...
3 KB (353 words) - 16:44, 8 May 2025
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically...
15 KB (1,251 words) - 08:41, 27 May 2025
conjunction with filesystem-level encryption with the intention of providing a more secure implementation. Since disk encryption generally uses the same key...
17 KB (2,194 words) - 10:17, 19 March 2025
SD card (redirect from Secure digital)
Secure Digital (SD) is a proprietary, non-volatile, flash memory card format developed by the SD Association (SDA). Owing to their compact size, SD cards...
159 KB (14,091 words) - 18:05, 9 June 2025
In cryptography, SAFER (Secure and Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers...
7 KB (842 words) - 16:23, 27 May 2025
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
30 KB (3,772 words) - 11:25, 5 December 2024
Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
50 KB (5,678 words) - 12:38, 4 June 2025
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United...
10 KB (1,040 words) - 10:14, 4 January 2025
2005). "Secure Startup - Full Volume Encryption: Technical Overview" (DOC). Retrieved March 14, 2015. Microsoft (April 21, 2005). "Secure Startup -...
79 KB (7,358 words) - 20:00, 9 June 2025
USB flash drive security (redirect from Secure USB Drive)
provide USB drive encryption using BitLocker to Go. The Apple Computer Mac OS X operating system has provided software for disc data encryption since Mac OS...
14 KB (1,659 words) - 03:27, 11 May 2025
VeraCrypt (category Disk encryption)
erasing all encryption keys from memory when a new device is connected. VeraCrypt documentation states that VeraCrypt is unable to secure data on a computer...
38 KB (3,210 words) - 20:39, 7 June 2025
A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator...
29 KB (3,633 words) - 08:24, 16 April 2025
cryptography. Secure symmetric algorithms include the commonly used AES (Advanced Encryption Standard) which replaced the older DES (Data Encryption Standard)...
99 KB (11,007 words) - 11:28, 7 June 2025
Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible...
27 KB (3,212 words) - 02:34, 12 March 2025
Data erasure (redirect from Secure file deletion)
overwriting the encryption keys. Presently, dedicated hardware/firmware encryption solutions can perform a 256-bit full AES encryption faster than the...
31 KB (3,085 words) - 14:00, 26 May 2025
Trusted execution environment (redirect from Secure Enclave)
hardware-based memory encryption that isolates specific application code and data in memory. This allows user-level code to allocate private regions of memory, called...
34 KB (3,140 words) - 16:18, 29 May 2025
Heterogeneous System Architecture (redirect from Heterogeneous Memory Management)
Retrieved 12 February 2015. "Linux Kernel 4.14 Announced with Secure Memory Encryption and More". 13 November 2017. Archived from the original on 13 November...
14 KB (1,842 words) - 03:02, 30 January 2025
confidentiality of information is of concern. When encryption is in place, data disposal is more secure, as less data (only the key material) needs to be...
8 KB (984 words) - 03:42, 28 May 2025
block-size. In encryption schemes, the unpredictable part of the IV has at best the same size as the key to compensate for time/memory/data tradeoff attacks...
14 KB (1,797 words) - 08:53, 7 September 2024
(VSS), which many secure MPC protocols use against active adversaries. Unlike traditional cryptographic applications, such as encryption or signature, one...
42 KB (5,909 words) - 21:09, 27 May 2025
USB flash drive (redirect from USB flash memory)
on-the-fly encryption systems are particularly useful in this regard, as they can transparently encrypt large amounts of data. In some cases, a secure USB drive...
83 KB (9,239 words) - 18:12, 10 May 2025