Symmetric-key algorithm

Results: 348



#Item
11Symmetric-key algorithm / RSA / Security Target / Evaluation / Common Criteria / Advanced Encryption Standard / FIPS 140-2

centercenterSupporting Document Mandatory Technical Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:10
12Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:42
13On the Security of Intra-Car Wireless Sensor Networks

On the Security of Intra-Car Wireless Sensor Networks

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Language: English - Date: 2014-04-11 22:39:21
14Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption  Introduction

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:31:20
15ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-14 13:47:17
16FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
17A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti  Yanbin Lu

A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2011-11-01 01:23:50
18CERTICOM WHITEPAPER SERIES  ECC and SCADA Key Management Rob Lambert, Certicom August 2010

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-11-08 15:42:56
19A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

Add to Reading List

Source URL: tls.mbed.org

Language: English
20Certicom AMI 7000 data sheet-front-rev10

Certicom AMI 7000 data sheet-front-rev10

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2009-06-02 19:28:55