Data Encryption Standard

Results: 514



#Item
91Time series / Stationary process / Bartlett / Data Encryption Standard

Introduction to Time Series Analysis. Lecture 1. Peter Bartlett 1. Organizational issues. 2. Objectives of time series analysis. Examples. 3. Overview of the course. 4. Time series models.

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2010-08-26 19:53:36
92Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

Microsoft Word - Reconfig2013_cr_v01.doc

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2013-11-15 15:24:17
93Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2014-03-28 15:45:17
94Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
95Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
96Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
97Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:56
98Stream ciphers / Block ciphers / KeeLoq / Data Encryption Standard / Tiny Encryption Algorithm / A5/1 / Key schedule / Slide attack / Nonlinear feedback shift register / ICE

KeeLoq Robert R. Enderlein School of Computer and Communication Sciences Semester Project

Add to Reading List

Source URL: www.e7n.ch

Language: English
99Differential cryptanalysis / Linear cryptanalysis / Block cipher / Stream cipher / Data Encryption Standard / S-box / Key schedule / Advanced Encryption Standard / NOEKEON / Higher-order differential cryptanalysis

The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:38
100Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:16
UPDATE