Initialization

Results: 404



#Item
311Block cipher / Block size / Ciphertext stealing / All-or-nothing transform / Padding / Initialization vector / Disk encryption theory / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

Email Comments on Block Cipher Modes of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:19:20
312C++ / Method / Cross-platform software / Procedural programming languages / Data types / C++ classes / Destructor / Initialization / Constructor / Software engineering / Computer programming / Computing

OHD C++ Coding Standards and Guidelines

Add to Reading List

Source URL: www.nws.noaa.gov

Language: English - Date: 2013-12-23 15:36:12
313Advanced Encryption Standard / Block cipher / Ciphertext / Cipher / Ciphertext stealing / Substitution-permutation network / Cryptography / Block cipher modes of operation / Initialization vector

The Advanced Encryption Standard Algorithm Validation Suite (AESAVS) November 15, 2002 Lawrence E. Bassham III National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
314Disk encryption / Hardware-based full disk encryption / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Initialization vector / Solid-state drive / Windows Vista / Trusted Computing Group / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-09 15:42:02
315Resource Acquisition Is Initialization / Charleston /  West Virginia / Huntington /  West Virginia / West Virginia Route 2 / Wheeling /  West Virginia / West Virginia / Geography of the United States / Object-oriented programming

PDF Document

Add to Reading List

Source URL: www.state.wv.us

Language: English - Date: 2014-07-25 10:24:21
316Pseudorandom number generators / Applied mathematics / Entropy / Hardware random number generator / Random number generation / Pseudorandomness / Min-entropy / Initialization vector / RBG / Cryptography / Randomness / Information theory

NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:06:47
317Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
318Block cipher modes of operation / End-to-end encryption / ETSI Satellite Digital Radio / European Telecommunications Standards Institute / Technology / Cipher / Initialization vector / Public safety / Cyberwarfare / Cryptography / Trunked radio systems / Terrestrial Trunked Radio

EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-20 09:48:15
319Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
320Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
UPDATE