<--- Back to Details
First PageDocument Content
Block cipher / Authenticated encryption / Stream cipher / Cipher / Index of cryptography articles / AEAD block cipher modes of operation / Block cipher modes of operation / Cryptography / EAX mode
Date: 2004-02-01 14:53:47
Block cipher
Authenticated encryption
Stream cipher
Cipher
Index of cryptography articles
AEAD block cipher modes of operation
Block cipher modes of operation
Cryptography
EAX mode

Add to Reading List

Source URL: www.cs.ucdavis.edu

Download Document from Source Website

File Size: 724,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

CP-G10i-Flyer-v10.fh-2 [Converted]

DocID: 1rapN - View Document

Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document

Cryptography / Public-key cryptography / Undeniable signature / Digital signature / RSA / David Chaum / Group signature / Ring signature / Index of cryptography articles

Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.

DocID: 1qL92 - View Document

Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1q9PC - View Document

Cryptography / Public-key cryptography / Elliptic curve cryptography / Finite fields / Elliptic curve / RSA Security / National Security Agency / Index of cryptography articles / Book:Cryptography

Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

DocID: 1q3yF - View Document