Key size

Results: 607



#Item
181Theoretical computer science / Quantum information science / Key management / Quantum key distribution / Secure Communication based on Quantum Cryptography / Key size / Photon / Quantum computer / Key / Cryptography / Quantum cryptography / Physics

IDQ White Paper - Understanding QKD

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
182Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
183UCAS / Doctor of Philosophy / Key Skills Qualification / University and college admissions / Higher education in the United Kingdom / Cheltenham

Size and Structure A maximum of 4,000 characters (or 47 lines of text) is to be used in the personal statement so you must ensure that you structure your personal statement sensibly to include all of the key areas. As yo

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2012-07-23 11:52:23
184Key schedule / Twofish / Block ciphers / ICE / Entropy / Key size / Fortuna / Crypt / S-box / Cryptography / Advanced Encryption Standard / Key management

Twofish Technical Report #4 Further Observations on the Key Schedule of Twofish Doug Whiting∗ John Kelsey†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
185Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
186

Daily Dilemma #11: Answer Key 1. The shapes in A, B and C are congruent because the two shapes in each pair has the same size and shape. 2. He put 1/3 of 1/2 of the lenses in the drawer. So 1/6 of the total number of

Add to Reading List

Source URL: fcit.usf.edu

- Date: 2013-01-10 19:20:01
    187Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

    Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-30 14:28:01
    188Cyberwarfare / Security / Software / Bitcoin / Peer-to-peer computing / Electronic commerce / RSA / Key size / Key / Key management / Public-key cryptography / Cryptography

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-15 21:49:39
    189ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography

    Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-16 09:55:41
    190Applied mathematics / Information theory / Information / Public-key cryptography / Cybernetics / List decoding / Binary symmetric channel / Key size / RSA / Coding theory / Error detection and correction / Mathematics

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-01-06 12:25:19
    UPDATE