Symmetric function

Results: 155



#Item
131Symmetric-key algorithm / NESSIE / SOBER / Cryptographic hash function / Anubis / Grand Cru / Hierocrypt / Nimbus / Cipher / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 18:26:12
132Disk encryption / Symmetric-key algorithm / Block cipher / Cipher / Block size / Cryptographic hash function / AES implementations / Encryption software / Cryptography / Advanced Encryption Standard / Cryptographic software

White Paper Securing Data at the Speed of Light with gKrypt V1.2

Add to Reading List

Source URL: www.gkrypt.com

Language: English - Date: 2013-06-28 06:22:34
133Combinatorics / Symmetric group / Cycle / Factorial / Variably Modified Permutation Composition / Parity of a permutation / Random permutation statistics / Mathematics / Permutations / Algebra

On inverting the VMPC one-way function KAMIL KULESZA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK1, Institute of Fundamental Technological Research, Polish Academy of

Add to Reading List

Source URL: www.newton.ac.uk

Language: English - Date: 2006-02-20 08:33:07
134Coordinate systems / Trigonometry / Multivariable calculus / Matrices / Sine / Polar coordinate system / Normal distribution / Multiple integral / Multivariate normal distribution / Calculus / Mathematical analysis / Mathematics

THE CONSTRUCTION AND PROPERTIES OF ELLIPSOIDAL PROBABILITY DENSITY FUNCTIONS GRAHAM L. GILLER A BSTRACT. A recipe for the construction of a multivariate probability density function from a normalized symmetric univariate

Add to Reading List

Source URL: www.gillerinvestments.com

Language: English - Date: 2007-10-22 14:12:36
135Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
136Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
137PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
138Computing / Merkle–Damgård construction / SIMD / Symmetry in mathematics / Symmetry / Hash function / Symmetric matrix / Block cipher / Cryptographic hash functions / Error detection and correction / Cryptography

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-01 05:47:23
139Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
140Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
UPDATE