Block cipher

Results: 1020



#Item
551ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
552Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
553Classical cipher

INDEX FOR P.L[removed]COUNTY BLOCK MAP (CENSUS[removed]INDEX MAP LEGEND SYMBOL NAME STYLE

Add to Reading List

Source URL: data.iowadatacenter.org

Language: English - Date: 2010-10-24 15:27:59
    554BSI / Boomerang attack / Block cipher

    A Study of Practical-time Distinguishing Attacks Against Round-reduced Threefish-256

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-21 15:43:24
    555Source code / Classical cipher / Latin alphabets / Obfuscated code / Obfuscation

    INDEX FOR P.L[removed]COUNTY BLOCK MAP (CENSUS[removed]INDEX MAP LEGEND SYMBOL NAME STYLE

    Add to Reading List

    Source URL: data.iowadatacenter.org

    Language: English - Date: 2010-10-24 15:26:36
    556Source code / Classical cipher / Latin alphabets / Obfuscated code / Obfuscation

    INDEX FOR P.L[removed]COUNTY BLOCK MAP (CENSUS[removed]INDEX MAP LEGEND SYMBOL NAME STYLE

    Add to Reading List

    Source URL: data.iowadatacenter.org

    Language: English - Date: 2010-10-24 15:26:27
    557Classical cipher

    INDEX FOR P.L[removed]COUNTY BLOCK MAP (CENSUS[removed]INDEX MAP LEGEND SYMBOL NAME STYLE

    Add to Reading List

    Source URL: data.iowadatacenter.org

    Language: English - Date: 2010-10-24 15:26:32
      558K1 / Tiny Encryption Algorithm / Block cipher / NIST hash function competition / Hash function / Merkle–Damgård construction / N-Hash / Cryptography / Cryptographic hash functions / Keccak

      A Keyed Sponge Construction with Pseudorandomness in the Standard Model

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-21 15:25:42
      559Classical cipher / The Alphabet Cipher / Computer programming / Computing / Software engineering

      Gets his chickenpox shots! Fun, Games and Coloring Book Word Find Find the words hidden in the block. They run up and down, side to side, backwards

      Add to Reading List

      Source URL: www.immunize.nc.gov

      Language: English - Date: 2011-07-25 15:25:10
      560Critical Security Parameter / Symmetric-key algorithm / FIPS 140 / Key / Block cipher modes of operation / Advanced Encryption Standard / Cryptography / Key management / FIPS 140-2

      KVL 3000 Plus Security Policy Security Policy for FIPS[removed]KVL 3000 Plus Version[removed]

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2007-09-19 01:00:00
      UPDATE