Block cipher

Results: 1020



#Item
371Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
372One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
373ICE / Cube attack / Ciphertext / Stream cipher / Trivium / Cipher / KN-Cipher / Crab / Cryptography / Block cipher / Key schedule

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, and Mohammad Reza Aref Sharif University of Technology, Tehran, Iran. {ahmadian,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-16 05:28:42
374MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
375Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
376Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
377National Security Agency / Random number generation / Hardware random number generator / Pseudorandomness / Cryptographic hash function / FIPS 140-2 / Block cipher / Dual EC DRBG / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

DRAFT NIST Special Publication 800-90A, Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 12:37:21
378Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / SHA-2 / HMAC / FIPS 140 / Block cipher / Crypto++ / AES implementations / Cryptography / Cryptography standards / Cryptographic software

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
379Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
380Public-key cryptography / Symmetric-key algorithm / Disk encryption / Encryption software / Key / ID-based encryption / Block cipher / Encryption / Pretty Good Privacy / Cryptography / Cipher / Key generation

CTO Corner September 2014 Why Encryption Is Essential and How to Address Potential Vulnerabilities Dan Schutzer, Senior Technology Consultant, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2014-09-23 08:09:57
UPDATE