Block cipher

Results: 1020



#Item
411System software / Freedesktop.org / X Window System / Wireless LAN / Block cipher modes of operation / Wireless bridge / Software / Computing / Wireless networking

Microsoft Word - 3eTI Security Policy 3e-523-F2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
412FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
413Key management / FIPS 140-2 / FIPS 140 / Block cipher / Zeroisation / Critical Security Parameter / BitLocker Drive Encryption / Network Security Services / Cryptography / Cryptography standards / Cryptographic software

Security Policy for the Motorola Accompli 009 Personal Communicator Encryption Services Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
414FIPS 140 / Block cipher modes of operation / Initialization vector / Advanced Encryption Standard / Public-key cryptography / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word[removed]Relm Security Policy Level 1 - version 1.4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
415Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
416Differential cryptanalysis / One-way compression function / Nimbus / Advanced Encryption Standard / Feistel cipher / Cryptography / Cryptographic hash functions / Block cipher

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
417Block cipher / Forwarding information base / RSA / Symmetric-key algorithm / Key / Optimal asymmetric encryption padding / Cipher / Skype protocol / Format-preserving encryption / Cryptography / Public-key cryptography / Electronic commerce

Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:23
418Block cipher / Advanced Encryption Standard / ICE / Linear cryptanalysis / Symmetric-key algorithm / S-box / Key schedule / Cryptanalysis / Ciphertext / Cryptography / Data Encryption Standard / Differential cryptanalysis

Copyright 2004, The Mathematical Association of America. All rights reserved. First published in the American Mathematical Monthly. Reprinted by permission. Polynomials in the Nation’s Service: Using Algebra to Design

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:30:18
419OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:09:22
420Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
UPDATE