Data Encryption Standard

Results: 514



#Item
341Data Encryption Standard / VEST / UES / Cryptography / Message authentication codes / Block ciphers

Comments on the security of RMAC as proposed in NIST Draft 800-38B

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:19:00
342Data Encryption Standard / Block cipher modes of operation / One-key MAC / Block cipher / DEAL / Provable security / CMAC / Cryptography / Message authentication codes / Advanced Encryption Standard

UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY · DAVIS · IRVINE · LOS ANGELES · RIVERSIDE · SAN DIEGO · SAN FRANCISCO

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:28:12
343Security / Cryptography / Credit cards / Data privacy / Information technology management / Payment Card Industry Data Security Standard / Information security / Encryption / Acquiring bank / Payment systems / Electronic commerce / Business

Microsoft PowerPoint - Securing the Transaction An Overview of Point-to-Point (P2P) Encryption 30-Apr-2014.ppt [Read-Only] [Com

Add to Reading List

Source URL: www.osc.nc.gov

Language: English - Date: 2014-05-01 15:57:43
344Block cipher modes of operation / CBC-MAC / Block cipher / Triple DES / Ciphertext / Cryptography / Data Encryption Standard / Message authentication codes

Analysis of RMAC Lars R. Knudsen DTU, Denmark November 10, 2002 Abstract In this paper the newly proposed RMAC system is analysed and a

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:21:24
345Advanced Encryption Standard / Data Encryption Standard / Block cipher / Encryption software / Block size / Cipher / Cryptography / Format-preserving encryption / Cryptographic software

Public Comments on the XTS-AES Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:01:26
346Ggplot2 / Visualization / Scatter plot / Nintendo DS / R / GEOM / Advanced Encryption Standard / Software / Free software / Statistics

Data Science with R Exploring Data with GGPlot2 [removed] 9th August 2014 Visit http://HandsOnDataScience.com/ for more Chapters.

Add to Reading List

Source URL: onepager.togaware.com

Language: English - Date: 2014-08-09 22:30:34
347Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
348Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
349Ciphertext / Cipher / Block cipher / Ciphertext stealing / Cryptography / Block cipher modes of operation / Data Encryption Standard

NIST SP[removed], Modes of Operation Validation System [MOVS]: Requirements and Procedures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-30 14:32:33
350Laptops / Mobile computers / Laptop / Personal computing / Password / Information security / Encryption / Two-factor authentication / Mobile computing / Security / Computing / Technology

State of Iowa Enterprise Laptop Data Protection Security Standard April 12, 2012 Purpose This standard establishes the minimum security requirements for laptop computers and the data stored on,

Add to Reading List

Source URL: das.ite.iowa.gov

Language: English - Date: 2012-04-23 14:18:37
UPDATE