Format-preserving encryption

Results: 36



#Item
11Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
12SYMMETRIC ENCRYPTION  Mihir Bellare UCSD

SYMMETRIC ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-22 17:34:42
13BLOCK CIPHERS  Mihir Bellare UCSD

BLOCK CIPHERS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-02 14:28:56
14A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 14:42:30
15The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 14:55:09
16InSight: RIVIER ACADEMIC JOURNAL, VOLUME 6, NUMBER 2, FALL[removed]ADVANCED ENCRYPTION STANDARD Douglas Selent* Student, M.S. Program in Computer Science, Rivier College Abstract

InSight: RIVIER ACADEMIC JOURNAL, VOLUME 6, NUMBER 2, FALL[removed]ADVANCED ENCRYPTION STANDARD Douglas Selent* Student, M.S. Program in Computer Science, Rivier College Abstract

Add to Reading List

Source URL: www.rivier.edu

Language: English - Date: 2010-11-24 19:07:40
17Analysis of VAES3 (FF2) Morris Dworkin Ray Perlner  National Institute of Standards and Technology

Analysis of VAES3 (FF2) Morris Dworkin Ray Perlner National Institute of Standards and Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 13:14:10
18Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:23
19Transparent Harddisk Encryption Thomas Pornin ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, 45 rue d’Ulm, 75005 Paris, France

Transparent Harddisk Encryption Thomas Pornin ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, 45 rue d’Ulm, 75005 Paris, France

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
20VAES3 scheme for FFX An addendum to “The FFX Mode of Operation for Format-Preserving Encryption” A parameter collection for encipher strings of arbitrary radix with subkey operation to lengthen life of the encipherin

VAES3 scheme for FFX An addendum to “The FFX Mode of Operation for Format-Preserving Encryption” A parameter collection for encipher strings of arbitrary radix with subkey operation to lengthen life of the encipherin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:18:02