Symmetric function

Results: 155



#Item
111Hashing / Cryptographic hash function / Key / HMAC / Symmetric-key algorithm / Block cipher / CMAC / Initialization vector / Advanced Encryption Standard / Cryptography / Message authentication codes / Key management

NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 13:48:23
112Block cipher / CBC-MAC / Cryptographic hash function / Symmetric-key algorithm / Advantage / Cipher / CMAC / Index of cryptography articles / Cryptography / Block cipher modes of operation / Message authentication codes

Comments on NIST’s RMAC Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:27:22
113Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
114Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
115Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
116ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
117Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
118Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English
119Symmetric functions / Representation theory of finite groups / Algebraic combinatorics / Enumerative combinatorics / Catalan number / Young tableau / Permutation / Binary tree / Robinson–Schensted–Knuth correspondence / Mathematics / Combinatorics / Algebra

Parking functions to non-decreasing parking function

Add to Reading List

Source URL: www.findstat.org

Language: English - Date: 2014-04-30 04:42:48
120Number theory / Numbers / Deficient number / Abundant number / Divisor / 170 / Table of divisors / Mathematics / Divisor function / Integer sequences

Microsoft Word - Binary Symmetric Book 1 luluya giden.doc

Add to Reading List

Source URL: symmetricbook.com

Language: English - Date: 2008-10-18 03:59:41
UPDATE