Data Encryption Standard

Results: 514



#Item
431Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
432Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
433Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2004-12-30 09:37:46
434Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
435Block size / Data Encryption Standard / RSA Secret-Key Challenge / Key size / ICE / Block cipher / RC6 / Cryptography / RC5 / Madryga

The RC5 Encryption Algorithm? Ronald L. Rivest MIT Laboratory for Computer Science

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 14:14:30
436Data Encryption Standard / Group action / XTR / Permutation / Three-pass protocol / Naccache–Stern cryptosystem / Cryptography / Abstract algebra / Finite fields

Is the Data Encryption Standard a group? (Results of cycling experiments on DES)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-02 16:24:32
437Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
438Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

1 New Weak-Key Classes of IDEA

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
439Feistel cipher / Cipher / Key schedule / Block ciphers / Data Encryption Standard / Blowfish / Cryptography / ICE / Weak key

Sinople: a 128-bit symmetric block cipher

Add to Reading List

Source URL: www.philippepaquet.com

Language: English - Date: 2011-01-20 03:20:41
440Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
UPDATE