ECRYPT

Results: 169



#Item
91Ubiquitous computing / KeeLoq / Radio-frequency identification / Power analysis / Side channel attack / MIFARE / NLFSR / Smart card / Rolling code / Cryptography / Espionage / Radio electronics

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-08-17 14:52:19
92Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
93Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
94ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
95Cube attack / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Trivium / Block cipher / Chosen-plaintext attack / Cipher / Cryptography / Espionage / Stream ciphers

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
96Mathematics / Keccak / NIST hash function competition / Joan Daemen / SHA-1 / Cryptol / Function / MD5 / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
97Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
98NIST hash function competition / Hashing / SHA-1 / SHA-2 / Keccak / Skein / Cryptanalysis / Joan Daemen / Hash list / Error detection and correction / Cryptographic hash functions / Cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
99Cryptography / Science / Radio-frequency identification / Cryptographic primitive / ECRYPT / Authentication protocol / Smart card / Computing / Index of cryptography articles / Ubiquitous computing / Technology / ISO standards

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:04:13
100Cryptographic protocol / ID-based encryption / Group signature / Scheme / Cryptography / ECRYPT / Public-key cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:35:10
UPDATE