Block cipher

Results: 1020



#Item
631Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
632Block cipher modes of operation / End-to-end encryption / ETSI Satellite Digital Radio / European Telecommunications Standards Institute / Technology / Cipher / Initialization vector / Public safety / Cyberwarfare / Cryptography / Trunked radio systems / Terrestrial Trunked Radio

EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-20 09:48:15
633Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
634Cipher / Symmetric-key algorithm / UES / NTRU / Key size / Q / Cryptography / Block ciphers / Elliptic curve cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:52:01
635ECRYPT / VEST / Block cipher / CRYPTON / Cipher / LEX / Cryptographic hash function / Data Encryption Standard / Crypto++ / Cryptography / Stream ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:35:07
636Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English
637Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / ARIA / Grøstl / SHA-2 / Galois/Counter Mode / NIST hash function competition / Cryptography / Cryptographic hash functions / Whirlpool

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob Markku-Juhani O. Saarinen Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-16 03:56:34
638Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
639Finite fields / Advanced Encryption Standard / Galois/Counter Mode / Block cipher / Authenticated encryption / NSA Suite B Cryptography / Poly1305-AES / XTR / Transport Layer Security / Cryptography / Message authentication codes / Block cipher modes of operation

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
640Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, and Eric M. Smith R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA.

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
UPDATE