Symmetric-key cryptography

Results: 367



#Item
101MUGI / MISTY1 / Cipher / Feistel cipher / Block size / Q / Symmetric-key algorithm / RC4 / SNOW / Cryptography / Stream ciphers / Block cipher

Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-16 22:19:01
102Symmetric-key algorithm / Advanced Encryption Standard / Data Encryption Standard / Cipher / Stream cipher / S-box / Cryptographic hash function / Cellular automaton / Crypto++ / Cryptography / Block cipher / Joan Daemen

Innovations in symmetric cryptography Joan Daemen STMicroelectronics, Belgium SSTIC, Rennes, June 5, 2013

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2013-06-27 13:18:02
103PGP / Public-key cryptography / Privacy software / Cipher / Key / Symmetric-key algorithm / GNU Privacy Guard / Pretty Good Privacy / S/MIME / Cryptography / Cryptographic software / Computer security

On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJUnited States of America Website: http://www.on-core.com Technical Support:

Add to Reading List

Source URL: www.on-core.com

Language: English - Date: 2015-03-30 11:01:16
104Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Authenticated encryption / Cryptographic nonce / Advanced Encryption Standard / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
105Key / Symmetric-key algorithm / Passphrase / Encrypting File System / S/MIME / Cryptography / Cipher / Public-key cryptography

On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJUnited States of America Website: http://www.on-core.com Technical Support:

Add to Reading List

Source URL: www.on-core.com

Language: English - Date: 2014-02-05 23:23:42
106Computer security / Key / S/MIME / Steganography / Cipher / RSA / Encryption / Symmetric-key algorithm / Information security / Cryptography / Key management / Public-key cryptography

Security Against Compelled Disclosure Ben Laurie A.L. Digital Ltd. Voysey House Barley Mow Passage London W4 4GB

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2006-10-26 22:06:14
107Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
108Symmetric-key algorithm / Key size / Key / Payment Card Industry Data Security Standard / EMV / ISO / Cryptography / Key management / Derived unique key per transaction

Visa Best Practices for Data Field Encryption, Version 1.0 Point of Sale to Acquirer Domain Security Goals 1. Limit cleartext availability of cardholder data and sensitive authentication data to the point of encryption a

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2013-09-06 08:42:22
109Substitution cipher / Cryptanalysis / Caesar cipher / Classical cipher / Playfair cipher / Block cipher / Symmetric-key algorithm / Hill cipher / Transposition cipher / Cryptography / Cipher / Vigenère cipher

Lecture 2: Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) January 20, 2015 9:44pm c

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-19 11:00:38
110Symmetric-key algorithm / Key size / Key / Cryptographic software / Cryptographic key types / Key encapsulation / Cryptography / Key management / Public-key cryptography

Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-07-02 17:10:35
UPDATE