Key size

Results: 607



#Item
571Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.plu.edu

Language: English - Date: 2003-02-21 11:38:34
572Finite fields / Computational hardness assumptions / Group theory / Elliptic curve cryptography / Logarithms / Elliptic curve / Integer factorization / Elliptic Curve DSA / Key size / Abstract algebra / Cryptography / Mathematics

PDF Document

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2009-11-30 17:04:11
573Block size / Data Encryption Standard / Key size / RSA Secret-Key Challenge / ICE / Cipher / Block cipher / RC6 / Cryptography / RC5 / Madryga

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 14:14:14
574Cipher / Meet-in-the-middle attack / Key size / Triple DES / RSA / Block cipher / Cryptanalysis / Multiple encryption / Rabin cryptosystem / Cryptography / Public-key cryptography / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-20 06:17:58
575Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-07 00:29:28
576Applied mathematics / Quantum information science / Kish cypher / Quantum key distribution / Quantum computer / Key size / Information-theoretic security / Man-in-the-middle attack / Noisy-storage model / Cryptography / Quantum cryptography / Theoretical computer science

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-06-18 20:01:55
577Finite fields / Elliptic curves / Elliptic curve cryptography / Group theory / Elliptic curve / Lenstra elliptic curve factorization / Edwards curve / Key size / Discrete logarithm / Abstract algebra / Cryptography / Mathematics

PDF Document

Add to Reading List

Source URL: airccse.org

Language: English - Date: 2012-09-24 00:58:21
578Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Common Criteria / Validation / Key size / Communications Security Establishment Canada / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-07-25 09:12:38
579Web services / Cryptographic hash functions / Amazon Elastic Compute Cloud / Cloud infrastructure / Infrastructure as a Service / Key management / SHA-2 / Key size / SHA-1 / Cloud computing / Cryptography / Computing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-17 09:04:41
580Cryptography standards / Internet standards / Secure communication / RSA / PKCS / Transport Layer Security / Padding / Chosen-ciphertext attack / Key size / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-29 14:13:55
UPDATE