Permutation cipher

Results: 61



#Item
21Mathematics / Pseudorandom number generators / Permutations / Pseudorandomness / Key / Random permutation / Entropy / Symmetric-key algorithm / Cipher / Cryptography / Randomness / Applied mathematics

Microsoft PowerPoint - random1

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
22Computing / Routing / ASCII art / Classless Inter-Domain Routing / IP address / IPv4 / Block cipher / Transmission Control Protocol / Pseudorandom permutation / Network architecture / Internet / Internet standards

Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu Jinliang Fan Mostafa H. Ammar College of Computing Georgia Institute of Technology Atlanta, GA

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 02:12:02
23Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
24Differential cryptanalysis / Q / Product cipher / Cryptanalysis / Cipher / Substitution cipher / Permutation cipher / Vigenère cipher / Advanced Encryption Standard / Cryptography / Block ciphers / Permutations

COMP4140 Introduction to Cryptography and Cryptosystems

Add to Reading List

Source URL: www.cs.umanitoba.ca

Language: English - Date: 2007-11-06 12:31:11
25Pseudorandom number generator / Function / Permutation / Factorial / Block cipher / Mathematics / Combinatorics / Integer sequences

Perfect Block Ciphers with Small Blocks Louis Granboulan1 and Thomas Pornin2 ´ Ecole Normale Sup´erieure; EADS [removed]

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
26Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:27:10
27Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2 AE2D8A57

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:28:38
28Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:26:12
29Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:27:56
30Block cipher / Linear cryptanalysis / Confusion and diffusion / Q / Permutation / Ciphertext / Cipher / Substitution cipher / BassOmatic / Cryptography / Mathematics / Substitution-permutation network

Substitution-Permutation Networks and Linear Cryptanalysis

Add to Reading List

Source URL: www.csc.kth.se

Language: English
UPDATE