Data Encryption Standard

Results: 514



#Item
111Crypt / Feistel cipher / DEAL / ICE / Block cipher / Bcrypt / Key schedule / Cryptography / Blowfish / Data Encryption Standard

ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF REASEARCH IN SCIENCE & TECHNOLOGY www.abhinavjournal.com A RELIABLE APPROACH TOWARDS SECURE

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:14:22
112Index of cryptography articles / Stream cipher / FEAL / Cipher / WAKE / RC5 / Feistel cipher / Differential cryptanalysis / Cryptanalysis / Cryptography / Data Encryption Standard / Block cipher

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
113FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
114Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-08 16:07:20
115Block ciphers / Lucifer / Cipher / Symmetric-key algorithm / DEAL / Format-preserving encryption / Substitution-permutation network / Cryptography / Data Encryption Standard / Feistel cipher

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
116University of Cambridge Computer Laboratory / Data Encryption Standard / ICE / Bitwise operation / XXTEA / Cryptographic hash functions / XTEA / Cryptography / Binary arithmetic / Tiny Encryption Algorithm

TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

Add to Reading List

Source URL: www.movable-type.co.uk

Language: English - Date: 2009-06-02 07:28:40
117Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21
118Secure communication / Computer law / CDW / Security / Encryption software / Data security / Payment Card Industry Data Security Standard / Computing / Application software / Linoma Software / Managed file transfer

Crypto Complete Customer Story Industry: Technology Company: CDW Corporation

Add to Reading List

Source URL: www.linomasoftware.com

Language: English - Date: 2011-08-04 11:30:31
119Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

PDF Document

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
120Algorithm / Mathematical logic / Theoretical computer science / Advanced Encryption Standard / Depth-first search / Directed acyclic graph / Digital signature / Cryptography / Mathematics / Search algorithms

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant* Frédéric Guihéry*

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2015-05-07 04:40:10
UPDATE