<--- Back to Details
First PageDocument Content
Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions
Date: 2013-02-07 00:29:28
Man-in-the-middle attack
Key size
Brute-force attack
VEST
Block cipher
Cipher
Advanced Encryption Standard
Meet-in-the-middle attack
Key schedule
Cryptography
Stream ciphers
Cryptographic hash functions

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 322,89 KB

Share Document on Facebook

Similar Documents

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1unET - View Document

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1ulfR - View Document

Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document

Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

DocID: 1rlUX - View Document

Advanced Encryption Standard / MD2 / Finite fields / Rijndael S-box / TI MSP430

Microsoft PowerPoint - HPTS_2009.ppt

DocID: 1qX2H - View Document