Block cipher

Results: 1020



#Item
111Block cipher / Symmetric-key algorithm / Ubiquitous computing / Computer security / Workshop on Cryptographic Hardware and Embedded Systems / Science / Mathematical sciences / Security / Cryptography / Cipher

Some Experimental Results on Attacking HFE with Buchberger Algorithm

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-01-18 19:29:59
112Cryptographic protocols / Data / Wireless networking / Computer network security / Advanced Encryption Standard / ZigBee / IPsec / Block cipher modes of operation / IEEE 802.15.4 / Cryptography / Computing / IEEE 802

Security Considerations for IEEENetworks Naveen Sastry David Wagner University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:45
113Block cipher modes of operation / Mode

New WITE32 Immediate Start Mode For Shorter Test Time • Typical Test Time Improvement 20–30% • Supported by Latest Revisions of RWA-2000 Series 1 The new mode of Guzik Test System operation allows for performing te

Add to Reading List

Source URL: www.guzik.com

Language: English - Date: 2007-09-18 00:49:34
114Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
115KeeLoq / Rolling code / MIFARE / Remote keyless system / NLFSR / Cipher / Block cipher / Contactless smart card / Radio electronics / Cryptography / Electronic engineering

Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-01-18 19:16:52
116

1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:16
    117

    1999 Paper 9 Question 15 Security Give examples of the use of a block cipher to provide assurance of (a) confidentiality (b) integrity

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:32
      118MULTI-S01 / Linear feedback shift register / Symmetric-key algorithm / Block cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Finite fields / Stream ciphers

      A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

      Add to Reading List

      Source URL: www.cryptrec.go.jp

      Language: English - Date: 2012-06-28 04:48:45
      119Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher

      Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-02-04 12:37:29
      120Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

      Christian Grothoff COMP 3704 Computer Security Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      Language: English - Date: 2011-06-21 07:45:42
      UPDATE