Block cipher modes of operation

Results: 320



#Item
31Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-07-22 20:05:52
32Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16
33

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
34

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:53
35This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
36

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
37Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1  University of Passau, Germany

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
38J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER  Introduction to differential power analysis

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
39SYMMETRIC ENCRYPTION  Mihir Bellare UCSD

SYMMETRIC ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-22 17:34:42
40On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16