Advanced Encryption Standard

Results: 1268



#Item
391Bluetooth / Wireless / Key-agreement protocol / Authentication / Man-in-the-middle attack / Advanced Encryption Standard / Cryptography / Technology / Cryptographic protocols

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
392Advanced Encryption Standard / Triple DES / FIPS 140 / FIPS / Cryptography / Cryptography standards / Cryptographic software

Georgia SoftWorks 17 Hwy 9 South PO Box 567 Dawsonville GA[removed]USA

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2012-11-21 13:26:32
393LOKI / Khufu and Khafre / Lucifer / Ciphertext / Advanced Encryption Standard / REDOC / Padding / Cryptanalysis / Cryptographic hash function / Cryptography / Differential cryptanalysis / Block cipher

Microsoft Word - Klima_SPI_2007_EN

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
394High-end audio / DVD / Computer storage media / Consumer electronics / Digital media / Blu-ray Disc / Compact Disc / DTS / Advanced Encryption Standard / Electronics / Audio storage / Information science

STANDARDS AND INFORMATION DOCUMENTS AES-21id-2011 AES Information Document for audio-file transfer and exchange Screen-less navigation for

Add to Reading List

Source URL: www.opusproductions.com

Language: English - Date: 2013-07-26 14:08:29
395Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
396Advanced Encryption Standard / Ciphertext / Cryptographic hash functions / Stream ciphers / One-way compression function / Cryptography / Block cipher / Transposition cipher

Microsoft Word - DN_HDN_EN.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-14 11:21:26
397Advanced Encryption Standard / Algorithm / Applied mathematics / Mathematics / Computer security / Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2

March 3, 2015 Dear CST Laboratories, Thank you for your feedback concerning the addition of cryptographic algorithm testing information to the CAVS tool’s vendor/implementation information page. This additional cryptog

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 08:24:36
398Security / Evaluation / Hardware-based full disk encryption / Crime prevention / National security / Computer network security / Common Criteria / Protection Profile / Advanced Encryption Standard / Disk encryption / Cryptography / Computer security

PP Reference: collaborative Protection Profile for Full Drive Encryption – Authorization Acquisition 1 2

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-09-05 16:01:03
399Encryption / Advanced Encryption Standard / Key Wrap / Public-key cryptography / Network Security & Cryptography / Cryptography / Disk encryption / Hardware-based full disk encryption

PP Reference: collaborative Protection Profile for[removed]collaborative Protection Profile for Full Drive

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-09-05 16:01:05
400Intel vPro / Computer hardware / Disk encryption / Intel Active Management Technology / AES instruction set / McAfee / Intel / Wake-on-LAN / Advanced Encryption Standard / Computing / Out-of-band management / Cryptography

Intel_McAfee_Security_horiz_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-31 20:04:17
UPDATE