<--- Back to Details
First PageDocument Content
Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards
Date: 2010-03-08 12:44:45
Cryptographic hash functions
Data Encryption Standard
Advanced Encryption Standard
Symmetric-key algorithm
Key size
FIPS 140-2
Block cipher
SHA-2
Message authentication code
Cryptography
Key management
Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Download Document from Source Website

File Size: 73,91 KB

Share Document on Facebook

Similar Documents

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1unET - View Document

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1ulfR - View Document

Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document

Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

DocID: 1rlUX - View Document

Advanced Encryption Standard / MD2 / Finite fields / Rijndael S-box / TI MSP430

Microsoft PowerPoint - HPTS_2009.ppt

DocID: 1qX2H - View Document