Block cipher

Results: 1020



#Item
481Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:07
482Manufacturing / Joint Test Action Group / Boundary scan / Scan chain / Test compression / Automatic test pattern generation / Block cipher / Man-in-the-middle attack / Side channel attack / Electronic engineering / Electronics / Electronics manufacturing

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING Received 30 April 2013; revised 6 October 2013; accepted 22 December[removed]Date of publication 5 February 2014; date of current version 7 May 2014.

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2014-06-16 15:59:17
483Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
484Decorrelation theory / Advanced Encryption Standard / Advantage / Hasty Pudding cipher / SAFER / RC6 / Serge Vaudenay / Key schedule / Tiny Encryption Algorithm / Cryptography / Block ciphers / DFC

DFC Update Olivier Baudron1, Henri Gilbert2 , Louis Granboulan1, Helena Handschuh3 , Robert Harley4, Antoine Joux5 , Phong Nguyen1 , Fabrice Noilhan6 , David Pointcheval1, Thomas Pornin1, Guillaume Poupard1, Jacques Ster

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
485Block size / Ciphertext / Key size / Cipher / Data Encryption Standard / Outline of cryptography / Cryptography / Advanced Encryption Standard / Block cipher

Federal Information Processing Standards Publication 197 November 26, 2001 Announcing the ADVANCED ENCRYPTION STANDARD (AES)

Add to Reading List

Source URL: www.nesdis.noaa.gov

Language: English - Date: 2010-12-23 16:04:00
486Pseudorandom number generator / Function / Permutation / Factorial / Block cipher / Mathematics / Combinatorics / Integer sequences

Perfect Block Ciphers with Small Blocks Louis Granboulan1 and Thomas Pornin2 ´ Ecole Normale Sup´erieure; EADS [removed]

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
487Linear feedback shift register / SNOW / Block cipher modes of operation / Serpent / Primitive polynomial / Q / Grain / Cryptography / Stream ciphers / SOSEMANUK

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
488NIST hash function competition / Crypt / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hash function / Block cipher

outbind://216-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A04

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:39:12
489Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Preimage attack / Block cipher / Advanced Encryption Standard / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

SHA-3 Hash Competition, Round 1 - OFFICIAL COMMENT: LESAMNTA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:13:26
490Julius Caesar / Advanced Encryption Standard / Block ciphers / Cipher / Network Security & Cryptography / Cryptography / Caesar cipher / Group theory

Security Audits: How to Fail them Big Time

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-06-09 07:59:35
UPDATE