AES implementations

Results: 62



#Item
21Reconfigurable computing / Field-programmable gate array / Block ciphers / AES implementations / DEAL / Xilinx / LEX / Advanced Encryption Standard process / CRYPTON / Cryptography / Advanced Encryption Standard / Data Encryption Standard

Contents I Compact and Efficient Encryption/Decryption Module Implementation of AES I.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:11:18
22Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
23Introductory physics / Mechanics / Cryptographic hash functions / Collision / AES implementations / Nonlinear system / Cryptography / Advanced Encryption Standard / Physics

Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1 Chair for Communication Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-20 06:12:45
24Disk encryption / Cryptographic protocols / Cross-platform software / TrueCrypt / Secure communication / AES implementations / HTTP Secure / Man-in-the-middle attack / Fortuna / Software / Cryptography / Cryptographic software

Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-07 13:11:05
25Advanced Encryption Standard / Key management / Special purpose file systems / Encrypting File System / AES implementations / Cryptography / Disk encryption / Cryptographic software

With the attached patch[removed]patch) we introduce transparent encryption for HFiles and the WAL for consideration. This work builds on a crypto codec framework to be submitted to the Hadoop Common and MapReduce projects.

Add to Reading List

Source URL: issues.apache.org

Language: English
26Cross-platform software / TrueCrypt / AES implementations / Cryptography / Software / Cryptographic software / Disk encryption

Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

Add to Reading List

Source URL: opencryptoaudit.org

Language: English - Date: 2015-04-02 06:24:01
27Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / FIPS 140 / Block cipher modes of operation / HMAC / Zeroisation / Crypto++ / AES implementations / Cryptography / Cryptography standards / Message authentication codes

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
28Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
29Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
30Block cipher / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CBC-MAC

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
UPDATE