Block cipher

Results: 1020



#Item
141Key schedule / ICE / Camellia

Speci cation of Camellia | a 128-bit Block Cipher Kazumaro AOKI y, Tetsuya ICHIKAWA z, Masayuki KANDA y, Mitsuru MATSUI z, Shiho MORIAI y, Junko NAKAJIMA z, Toshio TOKITA z

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:44
142PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
143Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
144Cryptographic protocols / Block cipher modes of operation / Crypto++ / Password-authenticated key agreement / Cryptography / Public-key cryptography / Cryptographic software

Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:38:56
145Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-08 16:07:20
146Block ciphers / Lucifer / Cipher / Symmetric-key algorithm / DEAL / Format-preserving encryption / Substitution-permutation network / Cryptography / Data Encryption Standard / Feistel cipher

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
147Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
148Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
149Binary arithmetic / Linear feedback shift register / A5/1 / Cellular automaton / Field-programmable gate array / Digital electronics / Block cipher / XOR gate / Cryptography / Electronic engineering / Stream ciphers

Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-17 09:30:36
150Initialization vector / Symmetric-key algorithm / Stream cipher / Block size / Ciphertext / RC4 / Triple DES / Cipher / Crypto++ / Cryptography / Block cipher modes of operation / Block cipher

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
UPDATE