<--- Back to Details
First PageDocument Content
Data Encryption Standard / Cipher / Avalanche effect / Key size / Block ciphers / AES implementations / Poly1305-AES / Cryptography / Advanced Encryption Standard / Symmetric-key algorithm
Date: 2012-08-23 05:37:56
Data Encryption Standard
Cipher
Avalanche effect
Key size
Block ciphers
AES implementations
Poly1305-AES
Cryptography
Advanced Encryption Standard
Symmetric-key algorithm

Untitled

Add to Reading List

Source URL: airccse.org

Download Document from Source Website

File Size: 287,48 KB

Share Document on Facebook

Similar Documents

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

DocID: 18qtC - View Document

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

DocID: OG5h - View Document

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

DocID: ewvM - View Document

2006 Paper 4 Question 10  Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

DocID: 5Pwb - View Document

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

DocID: 2SaS - View Document