Block cipher

Results: 1020



#Item
361Optimal asymmetric encryption padding / Advantage / Block cipher / ICE

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction∗ Jean-Sébastien Coron University of Luxembourg [removed]

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
362Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
363Symmetric-key algorithm / Cryptanalysis / Cipher / Novotel / Stream cipher / Cryptography / Block cipher / Serge Vaudenay

FSE 2013 Program Welcome reception will be at poolside of Novotel, and all technical sessions will be at Cinnamon Room of Novotel. The program is available in PDF. Sunday, 10 March 2013 •

Add to Reading List

Source URL: fse2013.spms.ntu.edu.sg

Language: English - Date: 2013-03-09 04:59:44
364Weak key / Linear cryptanalysis / Cipher / Correlation and dependence / Q / Differential cryptanalysis / Cryptography / Key schedule / Block cipher

On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem1 , Martin ˚ Agren2 , Peter Beelen1 , and Gregor Leander1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-30 09:12:12
365Cipher / Feistel cipher / Symmetric-key algorithm / QUAD / Public-key cryptography / Cryptanalysis / Vigenère cipher / Index of cryptography articles / Cryptography / Stream ciphers / Block cipher

A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
366FIPS 140-2 / Cryptographic primitive / Cryptographic hash function / Block cipher / Protection Profile / FIPS 140 / Key size / SHA-2 / PKCS / Cryptography / Cryptography standards / Common Criteria

Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-06-25 04:56:56
367Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
368Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
369Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
370Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
UPDATE