Block ciphers

Results: 398



#Item
61

New Birthday Attacks on Some MACs Based on Block Ciphers New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-08-17 00:42:08
    62MULTI-S01 / Linear feedback shift register / Symmetric-key algorithm / Block cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Finite fields / Stream ciphers

    A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

    Add to Reading List

    Source URL: www.cryptrec.go.jp

    Language: English - Date: 2012-06-28 04:48:45
    63Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

    Christian Grothoff COMP 3704 Computer Security Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2011-06-21 07:45:42
    64Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

    Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-05-23 10:19:24
    65ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

    Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

    Add to Reading List

    Source URL: www.cryptrec.go.jp

    Language: English - Date: 2012-06-28 04:48:44
    66Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

    Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-05-12 08:40:12
    67Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2007-02-27 09:35:26
    68Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

    Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

    Add to Reading List

    Source URL: www.acsac.org

    Language: English - Date: 2011-11-01 01:01:06
    69Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

    CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:23:43
    70Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

    Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

    Add to Reading List

    Source URL: www.philzimmermann.com

    Language: English - Date: 2003-06-01 01:29:48
    UPDATE