Block cipher

Results: 1020



#Item
831Mathematical analysis / English orthography / Classical cipher / Logarithms / Linguistics / Mathematics

1990 COUNTY BLOCK MAP (RECREATED): DALLAS County 32.954244N

Add to Reading List

Source URL: www2.census.gov

Language: English - Date: 2002-10-17 15:18:39
832American Institute of Chemists Gold Medal / Classical cipher

1990 COUNTY BLOCK MAP (RECREATED): DALLAS County International Pkwy

Add to Reading List

Source URL: www2.census.gov

Language: English - Date: 2002-10-17 15:18:40
833Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
834Cryptographic hash function / Block cipher / Password / Crypt / Key size / Key / Cipher / SHA-1 / Padding / Cryptography / Symmetric-key algorithm / Advanced Encryption Standard

maXbox Starter 13 Start with Crypto Programming 1.1 Set a Cipher

Add to Reading List

Source URL: www.softwareschule.ch

Language: English - Date: 2012-01-20 05:07:53
835Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
836Block cipher / ICE / Stream cipher / Advantage / Cryptography / Keccak / NIST hash function competition

Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
837JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: www3.ntu.edu.sg

Language: English - Date: 2011-01-18 19:17:26
838Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
839Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
840Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

1990 COUNTY BLOCK MAP (RECREATED): HARRIS County 30.044257N

Add to Reading List

Source URL: www2.census.gov

Language: English - Date: 2002-10-17 15:22:49
UPDATE