Block cipher

Results: 1020



#Item
341Keystream / Rotor machine / Cipher / Cryptanalysis / One-time pad / Block cipher / Enigma machine / Linear cryptanalysis / Differential cryptanalysis / Cryptography / Stream ciphers / Substitution cipher

Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 13:01:48
342Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
343Human–computer interaction / Radio-frequency identification / Block cipher modes of operation / Initialization vector / Crypt / Impinj / RFdump / Cryptography / Automatic identification and data capture / Technology

Accepted to JTAER at May 7, 2009 Read / Write Performance for low memory passive HF RFID tag-reader system Chih-Cheng Ou Yang1, B.S. Prabhu2, Charlie Qu3, Chi-Cheng Chu4, and Rajit Gadh5

Add to Reading List

Source URL: www.wireless.ucla.edu

Language: English - Date: 2009-07-22 15:57:32
344USB / Finite fields / Kingston Technology / Block cipher / USB flash drive / Elliptic curve cryptography / Comparison of encrypted external drives / Aloaha / Cryptography / Disk encryption / Advanced Encryption Standard

Header_Graphic_DataTraveler111

Add to Reading List

Source URL: www.kingston.com

Language: English - Date: 2014-12-03 18:45:56
345Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
346Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-10 16:40:02
347Mathematical logic / Hashing / Crypt / SHA-1 / Cipher / Block cipher / MD4 / Mathematical proof / Cryptography / Mathematics / Cryptographic hash functions

State Of The Art The Result A Proof Outline

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
348Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
349Cryptographic software / IEEE P1619 / Block cipher modes of operation / Symmetric-key algorithm / Block cipher / Advanced Encryption Standard / Key / Initialization vector / NSA Suite B Cryptography / Cryptography / Disk encryption / Key management

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
350Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:12:18
UPDATE