Data Encryption Standard

Results: 514



#Item
171Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
172Symmetric-key algorithm / Advanced Encryption Standard / Data Encryption Standard / Cipher / Stream cipher / S-box / Cryptographic hash function / Cellular automaton / Crypto++ / Cryptography / Block cipher / Joan Daemen

Innovations in symmetric cryptography Joan Daemen STMicroelectronics, Belgium SSTIC, Rennes, June 5, 2013

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2013-06-27 13:18:02
173University of Cambridge Computer Laboratory / Advanced Encryption Standard / 64-bit / International Data Encryption Algorithm / Cryptography / Block ciphers / Tiny Encryption Algorithm

Very Compact Hardware Implementations of the Blockcipher CLEFIA Toru Akishita and Harunaga Hiwatari Sony Corporation {Toru.Akishita,Harunaga.Hiwatari}@jp.sony.com

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-06-14 23:29:05
174RC6 / Advanced Encryption Standard / Q / Blowfish / VEST / SHA-1 / Data Encryption Standard / Cryptography / Cryptographic hash functions / Block ciphers

Automatic Formal Verification of Block Cipher Implementations

Add to Reading List

Source URL: verify.stanford.edu

Language: English - Date: 2010-02-18 01:25:10
175Tunneling protocols / Data / Network architecture / IPsec / Advanced Encryption Standard / Disk encryption / Cryptography / Cryptographic protocols / Internet protocols

USER CASE REDEFINING SECURITY Global Bank IDQ Secures Global Wide Area Network Multipoint 100 Megabit Ethernet Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
176Solid-state drive / Gigabit Ethernet / Advanced Encryption Standard

Ciphertex Data Security Debuts High-Performance Portable CX-4K-NAS Server Introducing the smallest high-performance, secure, portable and rugged NAS server to hit the market. Los Angeles, CA (PRWEB) August 25, Ci

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-25 12:25:10
177Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
178Harvest / Cyberwarfare / War / Digital media / Software / Advanced Encryption Standard / EMC Corporation / SecurID

Securely explore your data SQRRL 2.0 LAUNCH WEBINAR The Revolution in Cybersecurity and Linked Data Analysis with Richard Stiennon (IT-Harvest) and Luis Maldonado (Sqrrl)

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-03-23 16:08:37
179Notary / Computer security / Digital signature / Non-repudiation / Secure multi-party computation / Key exchange / Data Encryption Standard / David Chaum / Cryptography / Public-key cryptography / Cryptographic protocols

Davetli Konuşmacılar Director of Sophos Labs, VP SophosLabs & GEO Konu : Threat Landscape Demystified Abstract : Mark Harris will look at the current threat landscape and highlight current trends, such as Blackhat SEO

Add to Reading List

Source URL: www.bilgiguvenligi.org.tr

Language: English - Date: 2013-02-06 12:29:33
180Public-key cryptography / Key / Payment Card Industry Data Security Standard / Linoma Software / Vormetric / Cryptography / Key management / Tokenization

EncryptRIGHT® A better way to protect sensitive data throughout your enterprise EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite well-suited for a specific project or enterp

Add to Reading List

Source URL: www.primefactors.com

Language: English - Date: 2014-02-03 11:53:35
UPDATE