Index of cryptography articles

Results: 178



#Item
51Camellia / SAFER / RC6 / Feistel cipher / Key schedule / ICE / Cipher / Data Encryption Standard / Index of cryptography articles / Cryptography / Block ciphers / Hierocrypt

I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 08:53:09
52Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2001-12-26 10:46:32
53Advantage / Ciphertext / Stream cipher / Chosen-plaintext attack / Cipher / Block size / Initialization vector / Index of cryptography articles / Cryptography / Block cipher / Authenticated encryption

ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-29 09:57:15
54CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
55Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
56Cryptographic software / GNU Privacy Guard / Encryption / Export of cryptography in the United States / Index of cryptography articles / Cryptography / Security / Computer security

Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:21
57Finite fields / Elliptic curves / Public-key cryptography / Elliptic curve / Cipher / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Abstract algebra / Elliptic curve cryptography

International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-02-09 20:01:10
58Public-key cryptography / Whitfield Diffie / Diffie–Hellman key exchange / Key size / Initialization vector / Index of cryptography articles / Network Security Services / Cryptography / Cryptographic protocols / Key management

F-Response Now Cloud Service Privacy and Security Summary PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote

Add to Reading List

Source URL: www.f-response.com

Language: English - Date: 2014-11-03 13:25:55
59Internet protocols / Network management / Simple Network Management Protocol / Diffie–Hellman key exchange / Whitfield Diffie / Index of cryptography articles / Book:Cryptography / Cryptography / Cryptographic protocols / Computing

Communication & Network Security DigiSAFE LinkCrypt Reliable and Transparent Link Security

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:05:31
60Data Encryption Standard / International Cryptology Conference / Full Domain Hash / Index of cryptography articles / Cryptography / International Association for Cryptologic Research / Eurocrypt

V GUIDE Table of Contents Preface Program Committee

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-01-16 14:16:27
UPDATE