Block cipher

Results: 1020



#Item
621Block cipher modes of operation / Block cipher / Block size / Key size / Ciphertext / Cryptographic software / IEEE P1619 / Disk encryption theory / Cryptography / Advanced Encryption Standard / Disk encryption

The XTS-AES Validation System (XTSVS) Updated: September 5, 2013 Previously Updated: March 2, 2011 Original: March 31, 2010 Sharon S. Keller

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-04 14:11:58
622Advanced Encryption Standard / Block cipher / Ciphertext / Cipher / Ciphertext stealing / Substitution-permutation network / Cryptography / Block cipher modes of operation / Initialization vector

The Advanced Encryption Standard Algorithm Validation Suite (AESAVS) November 15, 2002 Lawrence E. Bassham III National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
623Advanced Encryption Standard / FIPS 140-2 / Block cipher modes of operation / Block cipher / IEEE P1619 / Key Wrap / IBM / Cryptography / Cryptography standards / Disk encryption

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-03 09:11:15
624Secure communication / Electronic commerce / Transport Layer Security / Padding / Block cipher modes of operation / GnuTLS / Cipher suite / RC4 / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Internet protocols

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-09 07:53:35
625Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
626Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
627ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
628Cube attack / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Trivium / Block cipher / Chosen-plaintext attack / Cipher / Cryptography / Espionage / Stream ciphers

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
629Key / FIPS 140-2 / Symmetric-key algorithm / Message authentication code / Digital Signature Algorithm / Block cipher / Data Encryption Standard / Digital signature / Cryptographic key types / Cryptography / Key management / Public-key cryptography

ITL BULLETIN FOR DECEMBER 2012 GENERATING SECURE CRYPTOGRAPHIC KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC KEY MANAGEMENT AND THE PROTECTION OF SENSITIVE INFORMATION Shirley Radack, Editor Computer Security Division Info

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:52:53
630Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
UPDATE