Finite fields

Results: 995



#Item
691Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / HMAC / CMAC / Block cipher / MD5 / Message authentication codes / Cryptography / Block cipher modes of operation

Multiple forgery attacks against Message Authentication Codes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:53:41
692Block cipher / Rijndael S-box / Varicode / Finite fields / Block cipher modes of operation / CMAC

Microsoft Word - Report2NIST_rev051.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:00:20
693Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
694Finite fields / Mathematics / Coding theory / Theoretical computer science / Error detection and correction

Lunenburg County Adult High School Student Application Form Applicant Information Full Name:

Add to Reading List

Source URL: ssilc.ednet.ns.ca

Language: English - Date: 2010-09-03 18:19:26
695Finite fields / Theoretical computer science / Coding theory / FO / Finite model theory / Mathematics

2008 K-12 Mathematics Supplemental Materials Review Appendices Updated March 18, 2009

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2009-04-08 10:15:03
696Finite fields / Information theory / Mathematics / Exponential mechanism / Kullback–Leibler divergence / Group theory / Statistical theory / Analytic number theory

A Search Story About the Peacock’s Tail Balázs Szentes DO NOT READ AND CIRCULATE! May 2, 2012 Abstract

Add to Reading List

Source URL: www.barcelonagse.eu

Language: English - Date: 2013-11-12 04:24:59
697Coding theory / Error detection and correction / Mathematics / Scholastic Corporation / Multiplier / Finite fields

http://teacher.scho lastic.com/pro oducts/math1 180/about.htm m MATH H 180 is a rev

Add to Reading List

Source URL: business.utah.gov

Language: English - Date: 2013-12-01 10:32:57
698Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:48:24
699Finite fields / Cryptographic protocols / Diffie–Hellman problem / Trapdoor function / Hellman / XTR / CDH / Diffie–Hellman key exchange / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
700Finite fields / Advanced Encryption Standard / Galois/Counter Mode / Block cipher / Authenticated encryption / NSA Suite B Cryptography / Poly1305-AES / XTR / Transport Layer Security / Cryptography / Message authentication codes / Block cipher modes of operation

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
UPDATE