Advanced Encryption Standard

Results: 1268



#Item
51Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-04-29 19:57:45
52Mathematics / Elementary mathematics / Music / Functions and mappings / Search algorithms / Calques / Earworm / Music psychology / Advanced Encryption Standard / Derivative / Variable / Hash function

The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:32:13
53Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

Add to Reading List

Source URL: bouncycastle.org

Language: English
54Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
55Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-10-15 15:27:48
56Cryptographic software / Cryptography standards / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / Key Wrap / Camellia / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: bouncycastle.org

Language: English - Date: 2016-04-08 19:51:32
57Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

Microsoft Word - Reconfig2013_cr_v01.doc

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2013-11-15 15:24:17
58Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2014-03-28 15:45:17
59Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
60Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
UPDATE