We've got 390 shorthands »

Acronyms that contain the term encryption 

What does encryption mean? This page is about the various possible meanings of the acronym, abbreviation, shorthand or slang term: encryption.

Possible matching categories:

Filter by: Sort by:PopularityAlphabeticallyCategory
TermDefinitionRating
E

Encryption

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption Standard

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption Standard

Computing » Drivers

Rate it:
AES

Advanced Encryption Standard

Computing » Networking

Rate it:
DES

Data Encryption Standard

Computing » Networking

Rate it:
DES

Data Encryption Standard

Academic & Science » Electronics

Rate it:
DES

Data Encryption Standard

Governmental » Military

Rate it:
DES

Data Encryption Standard

Computing » General Computing

Rate it:
WE

Wireless Encryption

Computing » Cyber & Security

Rate it:
IDEA

International Data Encryption Algorithm

Computing » Cyber & Security

Rate it:
IDEA

International Data Encryption Algorithm

Computing » Networking

Rate it:
IDEA

International Data Encryption Algorithm

Computing » General Computing

Rate it:
DES

Des Data Encryption Standard

Computing » Cyber & Security

Rate it:
ME

Message Encryption

Computing » Cyber & Security

Rate it:
3DES

Triple Data Encryption Standard

Computing » Cyber & Security

Rate it:
MPPE

Microsoft Point-to-Point Encryption

Computing » Networking

Rate it:
WEP

Wireless Encryption Protocol

Computing » Cyber & Security

Rate it:
ED

Encryption Device

Computing » Cyber & Security

Rate it:
ECP

Encryption Control Protocol

Computing » Cyber & Security

Rate it:
ECP

Encryption Control Protocol

Computing » Networking

Rate it:
IBE

Identity Based Encryption

Computing » Cyber & Security

Rate it:
KEK

Key Encryption Key

Computing » Cyber & Security

Rate it:
TEA

Tiny Encryption Algorithm

Computing » Cyber & Security

Rate it:
DEA

Data Encryption Algorithm

Computing » Cyber & Security

Rate it:
SAFE

Security and Freedom through Encryption

Computing » Networking

Rate it:
AES

Advanced Encryption Standard

Governmental » Military

Rate it:
PKE

Public Key Encryption

Computing » Cyber & Security

Rate it:
NE

Network Encryption

Computing » Cyber & Security

Rate it:
EES

Escrowed Encryption Standard

Computing » Cyber & Security

Rate it:
PBE

Password Based Encryption

Computing » Cyber & Security

Rate it:
ES

Encryption Scheme

Computing » Cyber & Security

Rate it:
DES

Data Encryption Software

Computing » Software

Rate it:
DEK

Data Encryption Key

Computing » Cyber & Security

Rate it:
PES

Proposed Encryption Standard

Computing » Cyber & Security

Rate it:
SEP

Scalable Encryption Processor

Computing » Networking

Rate it:
CMEA

Cellular Message Encryption Algorithm

Computing » Cyber & Security

Rate it:
LE

Line Encryption

Computing » Telecom

Rate it:
SET

Secure Encryption Technology

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption Standard

Computing » Telecom

Rate it:
FEK

File Encryption Key

Computing » Cyber & Security

Rate it:
AEP

Accelerated Encryption Processing

Business » Occupation & Positions

Rate it:
DES

Data Encryption Standard

Computing » Hardware

Rate it:
E3

End-to-End Encryption

Computing » Cyber & Security

Rate it:
EC

Encryption Control

Computing » Cyber & Security

Rate it:
EI

Encryption Items

Computing » Cyber & Security

Rate it:
TED

Trunk Encryption Device

Computing » Cyber & Security

Rate it:
TED

Trunk Encryption Device

Governmental » Military

Rate it:
CE

Communication Encryption

Computing » Cyber & Security

Rate it:
PKE

Public Key Encryption

Internet

Rate it:
ECS

Encryption Control System

Governmental » FBI Files

Rate it:
IPES

Improved Proposed Encryption Standard

Computing » Cyber & Security

Rate it:
SAFER

Secure And Fast Encryption Routine

Computing » Cyber & Security

Rate it:
NES

Network Encryption System

Computing » Cyber & Security

Rate it:
NES

Network Encryption System

Governmental » Military

Rate it:
EI

Encryption Item

Business » International Business

Rate it:
DES-CBC

Data Encryption Standard - Cipher Block Chaining

Computing » Cyber & Security

Rate it:
NED

Nuke Encryption Device

Governmental » Military

Rate it:
DES/CBC

Data Encryption Standard/Cipher Block Chaining

Computing » Cyber & Security

Rate it:
CAVE

Cellular Authentication and Voice Encryption

Computing » Cyber & Security

Rate it:
WAKE

Word Auto Key Encryption

Computing » Cyber & Security

Rate it:
MEK

Message Encryption Key

Computing » Cyber & Security

Rate it:
TE

Transmission Encryption

Computing » Cyber & Security

Rate it:
TE

Trunk Encryption

Computing » Networking

Rate it:
ECES

Elliptic Curve Encryption Scheme

Computing » Cyber & Security

Rate it:
ELA

Encryption Licensing Arrangement

Computing » Cyber & Security

Rate it:
IE

Intelligent Encryption

Computing » Cyber & Security

Rate it:
EL

Encryption Licensing

Computing » Cyber & Security

Rate it:
NEK

Network Encryption Key

Computing » Cyber & Security

Rate it:
NEU

Network Encryption Unit

Computing » Cyber & Security

Rate it:
SAFE

Secure And Fast Encryption

Computing » Cyber & Security

Rate it:
EPE

Enhanced Privacy and Encryption

Computing » Cyber & Security

Rate it:
SME

Short Message Encryption

Computing » Cyber & Security

Rate it:
SED

Secure Encryption Device

Computing » Hardware

Rate it:
PED

Programmable Encryption Device

Computing » Cyber & Security

Rate it:
EEE

End-to-End Encryption

Computing » Cyber & Security

Rate it:
EEE

End-to-End Encryption

Governmental » Military

Rate it:
IKE

Internet Key Encryption

Computing » Cyber & Security

Rate it:
RSAES-OAEP

Rivest-Shamir-Adleman Encryption Scheme - Optimal Asymmetric Encryption Padding

Computing » Cyber & Security

Rate it:
PKE

Public Key Encryption

Governmental » Military

Rate it:
TEK

Transmission Encryption Key

Computing » Cyber & Security

Rate it:
ESP

Encryption Security Protocol

Computing » Networking

Rate it:
TACTED

TACtical Trunk Encryption Device

Computing » Cyber & Security

Rate it:
EDESPL

Endorsed Data Encryption Standard Products List

Computing » Cyber & Security

Rate it:
BEK

Bulk Encryption Key

Computing » Cyber & Security

Rate it:
SED

Secure Encryption Device

Computing » Cyber & Security

Rate it:
TEED

Tactical End-to-end Encryption Device

Computing » Cyber & Security

Rate it:
TEED

Tactical End-to-End Encryption Device

Governmental » Military

Rate it:
ECMEA

Enhanced Cellular Message Encryption Algorithm

Computing » Cyber & Security

Rate it:
ECS

Encryption Control System

Computing » Cyber & Security

Rate it:
DESCBC

Data Encryption Standard/Cipher Block Chaining

Computing » Cyber & Security

Rate it:
EKG

Encryption Key Generator

Computing » Cyber & Security

Rate it:
CME

Cellular Message Encryption

Computing » Cyber & Security

Rate it:
MEA

Message Encryption Algorithm

Computing » Cyber & Security

Rate it:
TDES

Tactical Data Encryption System

Computing » Cyber & Security

Rate it:
GPEE

General Purpose Encryption Equipment

Computing » Cyber & Security

Rate it:
XES

XML Encryption Standard

Computing » Software

Rate it:
XES

XML Encryption Standard

Computing » Cyber & Security

Rate it:
ONE

Optimized Network Encryption

Computing » Cyber & Security

Rate it:
MLES

Multiple Line Encryption System

Computing » Cyber & Security

Rate it:
3DESE

Triple Data Encryption Standard Encryption

Computing » Cyber & Security

Rate it:
MLE

Multiple Line Encryption

Computing » Cyber & Security

Rate it:
WES

Wireless Encryption Standard

Computing » Cyber & Security

Rate it:
SEM

SmartStream Encryption Modulator

Computing » Hardware

Rate it:
INES

Improved Network Encryption System

Computing » Cyber & Security

Rate it:
EDES

Electronic Document Encryption System

Computing » Cyber & Security

Rate it:
AESDE

Advanced Encryption Standard Development Effort

Computing » Cyber & Security

Rate it:
DLED

Digital Line Encryption Device

Governmental » Military

Rate it:
3DESEP

Triple Data Encryption Standard Encryption Protocol

Computing » Cyber & Security

Rate it:
NLE

Network-Layer Encryption

Computing » Cyber & Security

Rate it:
INE

Improved Network Encryption

Computing » Cyber & Security

Rate it:
CES

Communication Encryption System

Computing » Cyber & Security

Rate it:
LES

Line Encryption System

Computing » Telecom

Rate it:
VEIL

Variable Encryption and Intelligence Labeling

Computing » Cyber & Security

Rate it:
HEAD

Hand-held Encryption Authentication Device

Computing » Cyber & Security

Rate it:
POME

Possibly OK Multicast Encryption

Computing » Cyber & Security

Rate it:
LCEAD

Low-Cost Encryption and Authentication Device

Computing » Cyber & Security

Rate it:
PPE

Prefix-Preserving Encryption

Computing » Cyber & Security

Rate it:
ILE

In-Line network Encryption

Computing » Cyber & Security

Rate it:
IKEP

Internet Key Encryption Protocol

Computing » Cyber & Security

Rate it:
SMEK

Short Message Encryption Key

Computing » Cyber & Security

Rate it:
AESD

Advanced Encryption Standard Development

Computing » Cyber & Security

Rate it:
WKEK

Working Key Encryption Key

Computing » Cyber & Security

Rate it:
LCED

Low-Cost Encryption Device

Computing » Cyber & Security

Rate it:
DEK

Device Encryption Key

Computing » Cyber & Security

Rate it:
RCE

Region Content Encryption

Computing » Cyber & Security

Rate it:
FBE

Function-Based Encryption

Computing » Cyber & Security

Rate it:
VFE

Version with Full Encryption

Computing » Software

Rate it:
VFE

Version with Full Encryption

Computing » Cyber & Security

Rate it:
IKES

Internet Key Encryption System

Computing » Cyber & Security

Rate it:
SPEE

Special Purpose Encryption Equipment

Computing » Cyber & Security

Rate it:
ACES

Army Communication Encryption System

Computing » Cyber & Security

Rate it:
XEU

Xerox Encryption Unit

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption Standard

Computing » Software

Rate it:
MPPE

Microsoft Point-to-Point Encryption

Computing » Telecom

Rate it:
DLED

Dedicated Loop Encryption Device

Governmental » Military

Rate it:
ENCRYPT

Encryption

Computing » Cyber & Security

Rate it:
HIBE

Hierarchical Identity Based Encryption

Computing » Cyber & Security

Rate it:
HIME

Huge Integer Math and Encryption

Computing » Cyber & Security

Rate it:
JOSE

Javascript Object Signing and Encryption

Computing » Java

Rate it:
FDE

Full Disk Encryption

Computing » Cyber & Security

Rate it:
TDEA

Triple Data Encryption Algorithm

Computing » Cyber & Security

Rate it:
FHE

Fully Homomorphic Encryption

Computing » Cyber & Security

Rate it:
RDE

Randomized Data Encryption

Computing » Cyber & Security

Rate it:
DES

Data Encryption Standard

Computing » Cyber & Security

Rate it:
DLED

dicated Loop Encryption Device

Computing » Cyber & Security

Rate it:
ERN

Encryption Registration Number

Computing » Cyber & Security

Rate it:
SKFE

Secret Key Functional Encryption

Computing » Cyber & Security

Rate it:
EHE

Exchange Hosted Encryption

Computing » Cyber & Security

Rate it:
SEK

Session Encryption Key

Computing » Cyber & Security

Rate it:
TDE

Transparent Data Encryption

Computing » Cyber & Security

Rate it:
PLEB

Physical Logical Encryption Backups

Computing » Cyber & Security

Rate it:
TPKE

Threshold Public Key Encryption

Computing » Cyber & Security

Rate it:
POODLE

Padding Oracle On Downgraded Legacy Encryption

Computing » Cyber & Security

Rate it:
FFSEM

Feistel Finite Set Encryption Mode

Computing » Cyber & Security

Rate it:
LDPE

Licensed Data Payload Encryption

Computing » Cyber & Security

Rate it:
HEAD

Handheld Encryption Authentication Device

Computing » Cyber & Security

Rate it:
DESCBC

Data Encryption Standard Cipher Block Chaining

Computing » Cyber & Security

Rate it:
JWE

JSON Web Encryption

Computing » Cyber & Security

Rate it:
SNEP

Sensor Network Encryption Protocol

Computing » Cyber & Security

Rate it:
MSIEA

Multi Stage Image Encryption Algorithm

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption System

Computing » Cyber & Security

Rate it:
CSEK

Customer Supplied Encryption Keys

Computing » Cyber & Security

Rate it:
PLBE

Private Linear Broadcast Encryption

Computing » Cyber & Security

Rate it:
DDPE

Dell Data Protection Encryption

Computing » Cyber & Security

Rate it:
EDE

Encryption Decryption Encryption

Computing » Cyber & Security

Rate it:
CAESAR

Competition for Authenticated Encryption Security Applicability and Robustness

Computing » Cyber & Security

Rate it:
OWE

One Way Encryption

Computing » Cyber & Security

Rate it:
MPPE

Microsoft Point to Point Encryption

Computing » Cyber & Security

Rate it:
MSEO

Media Server Encryption Option

Computing » Cyber & Security

Rate it:
COSE

CBOR Object Signing and Encryption

Computing » Cyber & Security

Rate it:
NNE

Native Network Encryption

Computing » Cyber & Security

Rate it:
IBCSE

Identity Based Combined Signature and Encryption

Computing » Cyber & Security

Rate it:
SNEAK

Snarkles Net Encryption Assortment Kit

Computing » Cyber & Security

Rate it:
FSE

Fast Software Encryption

Computing » Software

Rate it:
AEK

Algorithm Encryption Key

Computing » Cyber & Security

Rate it:
EDESP

Endorsed Data Encryption Standard Product

Computing » Cyber & Security

Rate it:
CEK

Content Encryption Key

Computing » Cyber & Security

Rate it:
SCEP

Simple Certificate Encryption Protocol

Business » Certifications & Diplomas

Rate it:
UEA

UMTS encryption algorithm

Computing » Cyber & Security

Rate it:
BYOE

Bring Your Own Encryption

Miscellaneous » Funnies

Rate it:
ODBE

Original Dynamic Broadcast Encryption

Computing » Cyber & Security

Rate it:
KAE

Key Agile Encryption

Computing » Cyber & Security

Rate it:
JOSE

JSON Object Signing and Encryption

Computing » Cyber & Security

Rate it:
HAIPE

High Assurance Internet Protocol Encryption

Internet

Rate it:
HAIPE

High Assurance Internet Protocol Encryption

Computing » Cyber & Security

Rate it:
HECTOR

Homomorphic Encryption Computing Techniques with Overhead Reduction

Computing

Rate it:
HECTOR

Homomorphic Encryption Computing Techniques with Overhead Reduction

Computing » Cyber & Security

Rate it:
DEDSS

Data Encryption Digital Signature System

Computing » Cyber & Security

Rate it:
NVE

NetApp Volume Encryption

Computing » Cyber & Security

Rate it:
PEKE

Probabilistic Encryption Key Exchange

Computing » Cyber & Security

Rate it:
DLED

Digital Loop Encryption Device

Computing » Cyber & Security

Rate it:
AEAD

Authenticated Encryption with Additional Data

Computing » Cyber & Security

Rate it:
RDES

Randomized Data Encryption Standard

Computing » Cyber & Security

Rate it:
TEKD

Transmission Encryption Key Device

Computing » Cyber & Security

Rate it:
MDE

Media Disk Encryption

Computing » Cyber & Security

Rate it:
EED

Encryption and Encapsulation Device

Computing » Cyber & Security

Rate it:
WDE

Whole Disk Encryption

Computing » Cyber & Security

Rate it:
POODLE

Padding Oracle On Downloaded Legacy Encryption

Computing » Cyber & Security

Rate it:
EKM

Encryption Key Manager

Computing » Cyber & Security

Rate it:
NPE

No Payload Encryption

Computing » Cyber & Security

Rate it:
PCE

Plaintext Checkable Encryption

Computing » Cyber & Security

Rate it:
FPE

Format Preserving Encryption

Computing » Cyber & Security

Rate it:
DLE

Downgraded Legacy Encryption

Computing » Cyber & Security

Rate it:
AEM

Authenticated Encryption Mode

Computing » Cyber & Security

Rate it:
SEH

Structured encryption handling

Computing » Cyber & Security

Rate it:
FTE

Format Transforming Encryption

Computing » Cyber & Security

Rate it:
FESF

File Encryption Solution Framework

Computing » File Extensions

Rate it:
PBE

Passphrase Based Encryption

Computing » Cyber & Security

Rate it:
BEK

Bitlocker Encryption Key

Computing » Cyber & Security

Rate it:
EAAS

Encryption as a Service

Computing » Cyber & Security

Rate it:
AES

American Encryption Standard

Computing » Cyber & Security

Rate it:
FBE

File Based Encryption

Computing » Cyber & Security

Rate it:
IDES

International Data Encryption Standard

International

Rate it:
IDES

International Data Encryption Standard

Computing » Cyber & Security

Rate it:
MNE

Management of Native Encryption

Business » Management

Rate it:
MNE

Management of Native Encryption

Computing » Cyber & Security

Rate it:
ADE

Azure Disk Encryption

Computing » Cyber & Security

Rate it:
IETF

Internet Encryption Task Force

Internet

Rate it:
IETF

Internet Encryption Task Force

Computing » Cyber & Security

Rate it:
CMEK

Customer Managed Encryption Keys

Computing » Cyber & Security

Rate it:
SDE

Steganos Disk Encryption

Computing » Cyber & Security

Rate it:
EERM

Endpoint Encryption for Removable Media

Computing » Cyber & Security

Rate it:
EERM

Endpoint Encryption Removable Media

Computing » Cyber & Security

Rate it:
DREM

Data at Rest Encryption Module

Computing » Cyber & Security

Rate it:
EOT

Encryption of things

Computing » Cyber & Security

Rate it:
RTES

Real Time Encryption Server

Computing » Cyber & Security

Rate it:
NDE

National Digital Encryption

Computing » Cyber & Security

Rate it:
SNEP

Secured Network Encryption Protocol8

Computing » Cyber & Security

Rate it:
LCED

Low Cost Encryption Device

Computing » Cyber & Security

Rate it:
DES

Defense Encryption Standard

Computing » Cyber & Security

Rate it:
IVES

Information Vending Encryption System

Computing » Cyber & Security

Rate it:
TRES

Trusted Reversible Encryption Service

Computing » Cyber & Security

Rate it:
HDE

Hard DISK Encryption

Computing » Cyber & Security

Rate it:
AEAS

Adaptive Encryption Acceleration System

Computing » Cyber & Security

Rate it:
LIME

Linphone Instant Messaging Encryption

Computing » Cyber & Security

Rate it:
VEA

Video Encryption Algorithm

Computing » Cyber & Security

Rate it:
ECES

Certified Encryption Specialist

Business » Certifications & Diplomas

Rate it:
ECES

Certified Encryption Specialist

Computing » Cyber & Security

Rate it:
KEP

Key Encryption Protocol

Computing » Cyber & Security

Rate it:
AAAE

Advanced Alternative Absolute Encryption

Computing » Cyber & Security

Rate it:
FEDS

Flexible Encryption of Data Stores

Computing » Cyber & Security

Rate it:
NAE

Network Attached Encryption

Computing » Cyber & Security

Rate it:
DRPE

Double Random Phase Encryption

Computing » Cyber & Security

Rate it:
SKEW

Symmetric Key Encryption Workshop

Computing » Cyber & Security

Rate it:
SKEW

Symmetric Key Encryption Workshop

Community » Workshops

Rate it:
SEE

SQLite Encryption Extension

Computing » Cyber & Security

Rate it:
NGE

Next Generation Encryption

Computing » Cyber & Security

Rate it:
FBE

Function Based Encryption

Computing » Cyber & Security

Rate it:
PEK

Private Encryption Key

Computing » Cyber & Security

Rate it:
DES

Data Encryption Security

Computing » Cyber & Security

Rate it:
DES

Device Encryption Standard

Computing » Cyber & Security

Rate it:
LEAP

Encryption Access Project

Computing » Cyber & Security

Rate it:
EDPC

Encryption Domain Per Community

Community

Rate it:
EDPC

Encryption Domain Per Community

Computing » Cyber & Security

Rate it:
EEE

End-to-End Encryption

Computing » Networking

Rate it:
FEBA

Firewalls, Encryption, Backups, and Access

Computing » Cyber & Security

Rate it:
AET

Advanced Encryption Technology

Computing » Cyber & Security

Rate it:
AET

Advanced Encryption Technology

Computing » Software

Rate it:
AES

American Encryption Service

Business » Companies & Firms

Rate it:
SARNEG

Search and Rescue Numerical Encryption Group

Governmental » Military

Rate it:
PSAE

Publish-Subscribe Authentication and Encryption

Computing » Cyber & Security

Rate it:
SEPP

Secure Encryption Payment Protocol

Business » Banking

Rate it:
BDE

BitLocker Drive Encryption

Computing » Cyber & Security

Rate it:
CSEKs

Customer-Supplied Encryption Keys

Computing » Cyber & Security

Rate it:
AES

Advanced Encryption Standard

Computing

Rate it:
DES

Data Encryption Standard

Computing

Rate it:
FVEK

Full Volume Encryption Key

Computing

Rate it:
DBEE

DataBase Email Encryption

Computing » Cyber & Security

Rate it:
E2EE

End-To-End Encryption

Computing » Cyber & Security

Rate it:
AEAD

Authenticated Encryption with Associated Data

Computing » Cyber & Security

Rate it:
CLAE

Certificate-Less Authenticated Encryption

Business » Certifications & Diplomas

Rate it:
CLAE

Certificate-Less Authenticated Encryption

Computing » Cyber & Security

Rate it:
MPPE

Microsoft Point-to-Point Encryption

Computing » Cyber & Security

Rate it:
OAEP

Optimal Asymmetric Encryption Padding

Computing » Cyber & Security

Rate it:
RTMPE

Real-Time Messaging Protocol Encryption

Computing » Cyber & Security

Rate it:
RKEP

Remotely Keyed Encryption Protocol (software)

Computing » Software

Rate it:
RKEP

Remotely Keyed Encryption Protocol (software)

Computing » Cyber & Security

Rate it:
AEA

Advanced Encryption Algorithm

Computing » IT

Rate it:
AES

Advanced Encryption Standard

Computing » IT

Rate it:
AHESP

Authentication Header Encryption Security Payload

Computing » IT

Rate it:
BDE

Bitlocker Drive Encryption

Computing » IT

Rate it:
BDEUI

Bitlocker Drive Encryption User Interface

Computing » IT

Rate it:
BLDE

Bitlocker Drive Encryption

Computing » IT

Rate it:
BTEA

Block Tiny Encryption Algorithm

Computing » IT

Rate it:
CBE

Comparison Based Encryption

Computing » IT

Rate it:
CBE

Content Based Encryption

Computing » IT

Rate it:
CEK

Content Encryption Key

Computing » IT

Rate it:
CEM

Client Encryption Manager

Computing » IT

Rate it:
CET

Cisco Encryption Technology

Computing » IT

Rate it:
CLPKE

Certificateless Public Key Encryption

Computing » IT

Rate it:
CMEA

Cellular Message Encryption Algorithm

Computing » IT

Rate it:
DARE

Data At Rest Encryption

Computing » IT

Rate it:
DEA

Data Encryption Algorithm

Computing » IT

Rate it:
DEAL

Data Encryption Algorithm with Larger Blocks

Computing » IT

Rate it:
DEC

Delphi Encryption Compendium

Computing » IT

Rate it:
DEK

Data Encryption Key

Computing » IT

Rate it:
DES

Data Encryption Standard

Computing » IT

Rate it:
DES

Digital Encryption Standard

Computing » IT

Rate it:
DESE

des Encryption Protocol

Computing » IT

Rate it:
DESEP

des Encryption Protocol

Computing » IT

Rate it:
DESX

Data Encryption Standard Extended

Computing » IT

Rate it:
DLED

Dedicated Loop Encryption Device

Computing » IT

Rate it:
E2EE

End to End Encryption

Computing » IT

Rate it:
EAIM

Encryption Aim

Computing » IT

Rate it:
ECP

Encryption Control Protocol

Computing » IT

Rate it:
EEK

Eap Encryption Key

Computing » IT

Rate it:
EER

Encryption Error Report

Computing » IT

Rate it:
EES

Escrowed Encryption Standard

Computing » IT

Rate it:
EKM

Encryption Key Manager

Computing » IT

Rate it:
EMAC

Encryption Mac

Computing » IT

Rate it:
ENCR

Encryption

Computing » IT

Rate it:
EPK

Encryption Provider Key

Computing » IT

Rate it:
ESP

Encryption Security Payload

Computing » IT

Rate it:
ETEE

End To End Encryption

Computing » IT

Rate it:
FDE

Full Disk Encryption

Computing » IT

Rate it:
FEK

File Encryption Key

Computing » IT

Rate it:
FHE

Fully Homomorphic Encryption

Computing » IT

Rate it:
FSE

Fast Software Encryption

Computing » IT

Rate it:
FVE

Full Volume Encryption

Computing » IT

Rate it:
FVEK

Full Volume Encryption Key

Computing » IT

Rate it:
GBDE

Geom Based Disk Encryption

Computing » IT

Rate it:
GDES

Generalized Data Encryption Standard

Computing » IT

Rate it:
GKEK

Group Key Encryption Key

Computing » IT

Rate it:
GTEK

Group Traffic Encryption Key

Computing » IT

Rate it:
HIBE

Hierarchical Identity Based Encryption

Computing » IT

Rate it:
HSE

High Speed Encryption

Computing » IT

Rate it:
IBE

Identity Based Encryption

Computing » IT

Rate it:
IBE

Identifier Based Encryption

Computing » IT

Rate it:
IDEA

International Data Encryption Algorithm

Computing » IT

Rate it:
IOE

Initiate Only Opportunistic Encryption

Computing » IT

Rate it:
ITAE

Integrated Tcp Acceleration and Encryption

Computing » IT

Rate it:
JOSE

Javascript Object Signing and Encryption

Computing » IT

Rate it:
JWE

Json Web Encryption

Computing » IT

Rate it:
MAGENTA

Multifunctional Algorithm for General Purpose Encryption and Network Telecommunication Applications

Computing » IT

Rate it:
MDE

Mcafee Drive Encryption

Computing » IT

Rate it:
MGTEK

Mbs Group Traffic Encryption Key

Computing » IT

Rate it:
MKEK

Mbs Key Encryption Key

Computing » IT

Rate it:
MPPE

Microsoft Point to Point Encryption

Computing » IT

Rate it:
MSE

Message Stream Encryption

Computing » IT

Rate it:
MSEO

Media Server Encryption Option

Computing » IT

Rate it:
MTEK

Mbs Traffic Encryption Key

Computing » IT

Rate it:
MVEA

Modified Video Encryption Algorithm

Computing » IT

Rate it:
NES

Network Encryption System

Computing » IT

Rate it:
NESSIE

New European Schemes for Signatures Integrity and Encryption

Computing » IT

Rate it:
OAEP

Optimal Asymmetric Encryption Padding

Computing » IT

Rate it:
OME

Office Message Encryption

Computing » IT

Rate it:
OWE

One Way Encryption

Computing » IT

Rate it:
PBE

Password Based Encryption

Computing » IT

Rate it:
PES

Proposed Encryption Standard

Computing » IT

Rate it:
PHE

Protocol Header Encryption

Computing » IT

Rate it:
PKE

Public Key Encryption

Computing » IT

Rate it:
POODLE

Padding Oracle On Downgraded Legacy Encryption

Computing » IT

Rate it:
PPE

Point to Point Encryption

Computing » IT

Rate it:
RSA

Rivest Shamir Adleman Encryption

Computing » IT

Rate it:
SAFE

Security and Freedom Through Encryption

Computing » IT

Rate it:
SAFER

Secure And Fast Encryption Routine

Computing » IT

Rate it:
SDE

Solaris Data Encryption

Computing » IT

Rate it:
SEAL

Software Optimized Encryption Algorithm

Computing » IT

Rate it:
SEFS

Stackable Encryption File System

Computing » IT

Rate it:
SME

Signaling Message Encryption

Computing » IT

Rate it:
SME

Storage Media Encryption

Computing » IT

Rate it:
SMEG

Simulated Metamorphic Encryption Generator

Computing » IT

Rate it:
SSE

Server Side Encryption

Computing » IT

Rate it:
STAC

Standards Based Encryption Compression

Computing » IT

Rate it:
TDE

Transparent Data Encryption

Computing » IT

Rate it:
TDEA

Triple Data Encryption Algorithm

Computing » IT

Rate it:
TDES

Triple Data Encryption Standard

Computing » IT

Rate it:
TEA

Tiny Encryption Algorithm

Computing » IT

Rate it:
TED

Trunk Encryption Device

Computing » IT

Rate it:
TEK

Traffic Encryption Key

Computing » IT

Rate it:
TEK

Ticket Encryption Key

Computing » IT

Rate it:
TESS

the Exponential Encryption System

Computing » IT

Rate it:
TMEE

Trend Micro Endpoint Encryption

Computing » IT

Rate it:
UEA

Umts Encryption Algorithm

Computing » IT

Rate it:
UES

Universal Encryption Standard

Computing » IT

Rate it:
UPEK

User Password Encryption Key

Computing » IT

Rate it:
VDE

Virtual Disk Encryption

Computing » IT

Rate it:
VTE

Vormetric Transparent Encryption

Computing » IT

Rate it:
WAKE

Word Auto Key Encryption

Computing » IT

Rate it:
WEP

Wireless Encryption Protocol

Computing » IT

Rate it:
WEP

Windows Encryption Provider

Computing » IT

Rate it:
XTEA

Extended Tiny Encryption Algorithm

Computing » IT

Rate it:
ZFDE

Zenworks Full Disk Encryption

Computing » IT

Rate it:
3DES

Triple Data Encryption Standard

Computing » IT

Rate it:
3DESE

Triple des Encryption Protocol

Computing » IT

Rate it:
ET

Encryption Technology

Academic & Science » Electronics

Rate it:
ET

Encryption Technology

Computing » Cyber & Security

Rate it:
ET

Encryption Technology

Computing » Technology

Rate it:
E2EE

End to End Encryption

Computing » Cyber & Security

Rate it:
HASH

In cybersecurity, a hash is defined as a cryptographic sequence, where an encryption method such as SHA-256 is used to digest (process) cleartext into a long, irreversible string of hexadecimal characters and digits.

Computing » Cyber & Security

Rate it:

What does encryption mean?

encoding, encryption(noun)
the activity of converting data or information into code

see more »

Discuss these encryption abbreviations with the community:

0 Comments

    Know what is encryption? Got another good explanation for encryption? Don't keep it to yourself!

    Still can't find the acronym definition you were looking for? Use our Power Search technology to look for more unique definitions from across the web!

    Citation

    Use the citation options below to add these abbreviations to your bibliography.

    Style:MLAChicagoAPA

    "encryption." Abbreviations.com. STANDS4 LLC, 2024. Web. 20 May 2024. <https://www.abbreviations.com/encryption>.

    Browse Abbreviations.com

    Free, no signup required:

    Add to Chrome

    Get instant explanation for any acronym or abbreviation that hits you anywhere on the web!

    Free, no signup required:

    Add to Firefox

    Get instant explanation for any acronym or abbreviation that hits you anywhere on the web!

    Quiz

    The ultimate acronym test

    »
    SSD
    A Solid State Drive
    B Solid State Digit
    C Serial Solid Directory
    D Semiconductor State Drive

    Embed

    Share an image of encryption

    »