Block cipher

Results: 1020



#Item
351Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
352Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
353EK / Snuffle / Stream ciphers / Keystream / Block cipher modes of operation

  New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
354IPv4 / Block cipher / Transmission Control Protocol / IP address / Internet / Network architecture / Internet standards / OSI protocols

Computer Networks[removed]–272 www.elsevier.com/locate/comnet Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 00:45:31
355Computing / Routing / ASCII art / Classless Inter-Domain Routing / IP address / IPv4 / Block cipher / Transmission Control Protocol / Pseudorandom permutation / Network architecture / Internet / Internet standards

Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu Jinliang Fan Mostafa H. Ammar College of Computing Georgia Institute of Technology Atlanta, GA

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 02:12:02
356Public-key cryptography / Cipher / Triple DES / Symmetric-key algorithm / Block cipher / Blowfish / Key size / Key / Advanced Encryption Standard / Cryptography / Key management / Data Encryption Standard

Volume 2, Issue 7, July[removed]ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering

Add to Reading List

Source URL: www.ijarcsse.com

Language: English - Date: 2014-02-16 11:55:40
357Block cipher / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CBC-MAC

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
358Cipher / Block cipher / Stream cipher / Cryptanalysis / RSA / Key / Digital signature / Index of cryptography articles / Book:Cryptography / Cryptography / Public-key cryptography / Key management

The Laws of Cryptography with Java Code by Neal R. Wagner Copyright c 2003 by Neal R. Wagner. All rights reserved.

Add to Reading List

Source URL: www.cs.utsa.edu

Language: English - Date: 2004-08-20 15:40:56
359Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
360Poly1305-AES / Block cipher / VMAC / Advanced Encryption Standard / Tiny Encryption Algorithm / CBC-MAC / ARIA / Q / Triple DES / Cryptography / Message authentication codes / CMAC

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
UPDATE