Block cipher

Results: 1020



#Item
441Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

First Modes of Operation Workshop (October[removed]CTR Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:57
442Plaintext-aware encryption / Malleability / Advantage / Block cipher modes of operation / Chosen-ciphertext attack / Ciphertext / Cryptography / Chosen-plaintext attack / Ciphertext indistinguishability

First Modes of Operation Workshop (October 2000): A Message Integrity in Symmetric Encryption Message-Int4.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:32:39
443Secure Shell / Transport Layer Security / OpenSSH / Padding / RSA / Block cipher modes of operation / Cryptographic primitive / Index of cryptography articles / Serge Vaudenay / Cryptography / Electronic commerce / Internet standards

C:/Documents and Settings/Gaven Watson/Desktop/thesis/final/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-09-17 04:30:43
444Computer architecture / Secure cryptoprocessor / CPU cache / Memory management unit / Software protection dongle / Bus encryption / X86 memory segmentation / Interrupt handler / Memory protection / Computer hardware / Computing / Cryptography

The TrustNo 1 Cryptoprocessor Concept Markus Kuhn — [removed] — [removed]Abstract: Cryptoprocessors feature an on-chip block cipher hardware between the cache and the bus interface. Code and data are decry

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-06 07:11:39
445Stream ciphers / Differential cryptanalysis / Boomerang attack / Block cipher / E0 / XTEA / Linear feedback shift register / Constraint programming / Salsa20 / Cryptography / Pseudorandom number generators / SHACAL

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-18 13:28:11
446Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
447Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
448Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-04-11 09:39:21
449Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
450Galois/Counter Mode / AES instruction set / Q / Coprocessor / NSA Suite B Cryptography / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
UPDATE