Format-preserving encryption

Results: 36



#Item
1Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-30 23:23:40
2On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2010-12-10 03:09:04
3Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg ()  May 21, 2013

Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:15
4A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway†  June 17, 2003

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
5ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-14 13:47:17
6FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
7Security I – exercises Markus Kuhn Easter 2015 – CST Part IB  1

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
8Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
9

PDF Document

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-05-01 12:15:32
10Practical Solutions For Format-Preserving Encryption Mor Weiss Boris Rozenberg  Muhammad Barham

Practical Solutions For Format-Preserving Encryption Mor Weiss Boris Rozenberg Muhammad Barham

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:17