Key size

Results: 607



#Item
581CCM mode / Authenticated encryption / Block cipher / CBC-MAC / Symmetric-key algorithm / Data Encryption Standard / Feistel cipher / Block size / Galois/Counter Mode / Cryptography / Block cipher modes of operation / Message authentication codes

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-02 09:54:42
582CBC-MAC / One-key MAC / Block cipher / Data Encryption Standard / Triple DES / Block size / Symmetric-key algorithm / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CMAC

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-02 09:48:35
583Cryptographic Module Validation Program / FIPS 140 / Key size / Public-key cryptography / Key management / Digital Signature Algorithm / Key / FIPS 140-3 / CRYPTREC / Cryptography / Cryptography standards / FIPS 140-2

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-02 11:02:03
584Message authentication codes / Cryptographic hash functions / Block cipher / Galois/Counter Mode / SHA-2 / Advanced Encryption Standard / Key size / FIPS 140-2 / Secure Hash Standard / Cryptography / Block cipher modes of operation / Cryptography standards

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 08:42:48
585Data Encryption Standard / Key size / Vincent Rijmen / Federal Information Processing Standard / Advanced Encryption Standard process / Key Wrap / Cryptography / Advanced Encryption Standard / National Institute of Standards and Technology

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
586Finite fields / Post-quantum cryptography / McEliece cryptosystem / Error detection and correction / Forward error correction / Key size / XTR / RSA / Quantum computer / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 03:44:31
587Cipher / Cryptanalysis / Key size / Symmetric-key algorithm / SciEngines GmbH / Custom hardware attack / Cryptography / Data Encryption Standard / Brute-force attack

PDF Document

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-04 05:36:33
588Array programming languages / Cryptographic hash functions / Hasty Pudding cipher / Q / Key size / Weak key / K / VEST / Hash function / Cryptography / Key management / APL programming language family

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
589National Institute of Standards and Technology / Emerging technologies / Standards / Digital Signature Algorithm / FIPS 140-2 / Smart grid / Federal Information Processing Standard / Key size / Cyber security standards / Cryptography / Cryptography standards / Standards organizations

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-25 22:42:36
590Cryptographic Module Validation Program / Elliptic Curve DSA / Digital Signature Algorithm / Digital signature / Pseudorandom number generator / Key size / Advanced Encryption Standard / CRYPTREC / Cryptographically secure pseudorandom number generator / Cryptography / Cryptography standards / FIPS 140-2

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-16 08:23:17
UPDATE