Block cipher modes of operation

Results: 320



#Item
21Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-10-10 11:05:41
221 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
23

PDF Document

Add to Reading List

Source URL: smaccmpilot.org

Language: English - Date: 2014-03-04 18:04:46
24Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:38:56
25Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
26Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
27Crypto Corner Editors: Peter Gutmann,  David Naccache,  Charles C. Palmer,   Room at the Bottom

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
28YubiHSM User Manual Version: 1.5.0 April 6, 2015  yubico

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-04-13 14:47:47
29Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
30Practical Experiences with ATM Encryption Gregory T. Byrd NC State University Raleigh, NC  Nathan Hillery

Practical Experiences with ATM Encryption Gregory T. Byrd NC State University Raleigh, NC Nathan Hillery

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:14:41