Block ciphers

Results: 398



#Item
181Notation / Theoretical computer science / Hamming / Reed–Solomon error correction / Code / Hamming code / Block code / Coding theory / Error detection and correction / Mathematics

MEP: Codes and Ciphers, UNIT 5 Binary Codes Pupil Text 5 Binary Codes You have already seen how check digits for bar codes (in Unit 3) and ISBN numbers

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 13:01:42
182Initialization vector / Cipher / Substitution cipher / WAKE / A5/1 / Keystream / Py / Correlation attack / Grain / Cryptography / Stream ciphers / Block cipher

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 09:57:44
183Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
184Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
185Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:23:24
186OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:09:22
187Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:20:22
188NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
189Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

First Modes of Operation Workshop (October[removed]Encryption Modes with Almost Free Message Integrity jutla-auth.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:36:55
190Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

First Modes of Operation Workshop (October[removed]CTR Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:57
UPDATE