Initialization vector

Results: 165



#Item
61Cryptographic software / IEEE P1619 / Block cipher modes of operation / Symmetric-key algorithm / Block cipher / Advanced Encryption Standard / Key / Initialization vector / NSA Suite B Cryptography / Cryptography / Disk encryption / Key management

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
62Cryptographic software / Cryptographic protocols / Internet protocols / Secure communication / RC4 / Stream cipher / Initialization vector / Transport Layer Security / Symmetric-key algorithm / Cryptography / Software / Computing

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [removed] Abstract. In this report, we point out a serious security flaw in Microsoft Word and Excel. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 07:26:49
63Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
64VEST / Keystream / Initialization vector / NLFSR / B53 / B81 / Stream ciphers / Cryptography / Grain

Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-16 23:58:57
65Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

A Practical Message Falsification Attack on WPA Toshihiro Ohigashi1 and Masakatu Morii2 1 Hiroshima University, 1–4–2 Kagamiyama, Higashi-Hiroshima, 739–8511 Japan

Add to Reading List

Source URL: jwis2009.nsysu.edu.tw

Language: English - Date: 2014-07-04 02:33:26
66Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
67Initialization vector / Smart card / Subscriber identity module / Symmetric-key algorithm / RSA / Cipher / Cryptography / Public-key cryptography / PKCS

Unpicking PLAID A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele1 Victoria Fehr2 Felix Günther2 Giorgia Azzurra Marson2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-27 08:26:56
68FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Critical Security Parameter / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 12:21:50
69FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Key Wrap / Critical Security Parameter / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 11:58:21
70Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
UPDATE