Data Encryption Standard

Results: 514



#Item
151Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
152ICE / Block cipher / Data Encryption Standard / MacGuffin / S-box / Ping / Computing / Software / System software / Computer arithmetic / Q

The MacGun Block Cipher Algorithm Matt Blaze AT&T Bell Laboratories 101 Crawfords Corner Road, Holmdel, NJUSA

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
153Solid-state drive / USB flash drive / Universal Serial Bus / Data security / USB 3.0 / Advanced Encryption Standard / Cryptographic software / USB / Computer hardware / Cryptography / Disk encryption

PENDING Secure USB 3.0 Solid State Flash Drive IP 57 Rating

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2015-04-08 07:32:27
154KASUMI / Block cipher / VEST / Feistel cipher / Linear cryptanalysis / SC2000 / Data Encryption Standard / Cryptography / Differential cryptanalysis / MISTY1

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
155Key / Advanced Encryption Standard / Symmetric-key algorithm / Encryption / Public-key cryptography / Disk encryption / Key Wrap / Encrypting File System / Cryptography / Key management / Derived unique key per transaction

Visa Europe’s Best Practices for Data Field Encryption, Version 1

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
156Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 23:11:43
157Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
158Schedule / Transaction processing / Hamming weight / Advanced Encryption Standard / Vehicle Identification Number / Cube / Geometry / Euclidean geometry / Data management

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA Yongdae Kim1,2 and Hyunsoo Yoon1 1 Department of Computer Science, Korea Advanced Institute of Science and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 03:28:54
159Side channel attack / Data Encryption Standard / Entropy / Correlation attack / RSA / Cryptanalysis / Cipher / Cryptography / Espionage / Power analysis

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
160Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
UPDATE