Block cipher

Results: 1020



#Item
721Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
722Optimal asymmetric encryption padding / RSA / Padding / Block cipher / Cipher / Random oracle / Cryptography / Public-key cryptography / Signcryption

Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman† Stanislaw Jarecki‡

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:05:14
723Block cipher / E0 / KFB mode / Linear cryptanalysis / Cryptography / Stream ciphers / Keystream

Comments on \Theory and Applications of Cellular Automata in Cryptography" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K. June 26, 199

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:58
724Keccak / Cryptographic hash function / JH / Grøstl / BLAKE / Block cipher / Crypt / Skein / ICE / NIST hash function competition / Error detection and correction / Cryptography

Microsoft Word - SHA3_3rdCC_Submission_Paper_Kavun_Yalcin.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:11:44
725Block cipher / ICE / Ciphertext / Chosen-plaintext attack / Differential cryptanalysis / Classical cipher / Cryptography / Data Encryption Standard / Cryptanalysis

June 14, [removed]Markov Ciphers and

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:38:20
726Symmetric-key algorithm / NESSIE / SOBER / Cryptographic hash function / Anubis / Grand Cru / Hierocrypt / Nimbus / Cipher / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 18:26:12
727Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
728Advanced Encryption Standard / Computer security / National Institute of Standards and Technology / Advanced Encryption Standard process / National Security Agency / FIPS 140-2 / FIPS 140 / Block cipher / Information security / Cryptography / Cryptography standards / Security

Public Comments Received on NISTIR 7977: NIST Cryptographic Standards and Guidelines Development Process (Draft) Carlos G. Salinas .........................................................................................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-30 13:24:52
729Encryption / Symmetric-key algorithm / Public-key cryptography / Encrypting File System / Index of cryptography articles / Cryptography / Cipher / Block cipher

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation NTT and Mitsubishi Electric Develop Advanced Encryption Scheme to Increase Cloud Computing Security

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2014-02-17 01:20:19
730RC4 / Ciphertext / One-time pad / Block cipher / Cipher / Correlation attack / Gilbert Vernam / Running key cipher / Cryptanalysis / Cryptography / Stream ciphers / Keystream

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
UPDATE