Block cipher

Results: 1020



#Item
181Differential cryptanalysis / Linear cryptanalysis / Block cipher

Microsoft Word - SEED_Self_Evaluation-English_M

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
182Key schedule / Py / Cipher / ICE / RC4 / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-03 23:50:29
183Key generation / Block ciphers / Disk encryption / Block cipher modes of operation / Cryptography / SEED / Key Wrap

SEED Algorithm Object Identifiers. SEED Algorithm Object Identifiers

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
184Random permutation / Pseudorandom permutation / Permutation / Block cipher / FO / Distinguishing attack / Mathematics / Combinatorics / Advantage

XLS is not a Strong Pseudorandom Permutation Mridul Nandi Indian Statistical Institute, Kolkata , Abstract. In FSE 2007, Ristenpart and Rogaway had described a generic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 03:16:12
185Block size / Ciphertext / Key size / Cipher / Data Encryption Standard / Outline of cryptography / Cryptography / Advanced Encryption Standard / Block cipher

Federal Information Processing Standards Publication 197 November 26, 2001 Announcing the ADVANCED ENCRYPTION STANDARD (AES)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:47:42
186Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
187Cipher / Block cipher / Public-key cryptography / Key / RSA / Substitution cipher / One-time pad / Stream cipher / Index of cryptography articles / Cryptography / Symmetric-key algorithm / Ciphertext

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
188Cipher / Mix network / RSA / Block cipher / Chosen-ciphertext attack / Key / Schmidt–Samoa cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
189Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
190FIPS 140-2 / Cryptographic primitive / Block cipher / Key generation / Key / Symmetric-key algorithm / Random number generation / Algorithm / Computer security / Cryptography / Key management / Formal sciences

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-12-30 15:45:55
UPDATE