Symmetric-key cryptography

Results: 367



#Item
111Key size / Advanced Encryption Standard / Advantage / Symmetric-key algorithm / Stream cipher / Format-preserving encryption / Cipher / ARIA / ICE / Cryptography / Block ciphers / Key management

The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 14:55:09
112Key management / RSA / Diffie–Hellman key exchange / Modular arithmetic / Key generation / Cryptography / Public-key cryptography / Electronic commerce

Accelerating Cryptography in Hardware • Public Key • Random Number Generation • Symmetric Key Mark Birman

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 22:48:36
113Block cipher / Cipher / Stream cipher / Advanced Encryption Standard / ICE / Symmetric-key algorithm / Substitution cipher / S-box / Crypt / Cryptography / Data Encryption Standard / Ciphertext

SFWR 4C03: Computer Networks and Computer Security Mar[removed]Lecturer: Kartik Krishnan

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2005-12-03 12:37:56
114Key management / Public-key cryptography / Electronic health record / Personal health record / Data mining / Cipher / Symmetric-key algorithm / Key / Key generation / Cryptography / International standards / Formal sciences

2014 Second International Conference on Advanced Cloud and Big Data Protecting and Analysing Health Care Data on Cloud Danan Thilakanathan∗† , Yu Zhao∗ , Shiping Chen∗† , Surya Nepal† , Rafael A. Calvo∗ an

Add to Reading List

Source URL: rafaelacalvo.files.wordpress.com

Language: English - Date: 2015-03-25 23:28:51
115Revocation list / Key size / Key / Symmetric-key algorithm / X.509 / Cryptography / Key management / Public-key cryptography

Page < PAGE >2 of < NUMPAGES >27 OCPS Version 1.1 Draft March 31, 2002 Open Copy Protection System Philips Research Proposal to Broadcast Protection Discussion Group

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2004-04-30 19:02:04
116WS-Security / Key / Symmetric-key algorithm / Cryptographic software / Cryptography / Public-key cryptography / Key management

31st July 2008, National ICT Australia, 7 London Circuit, Canberra Web Services Forum - Summary of Outcomes Background: A Web Service Forum was jointly offered by IHE Asia-Pacific, HL7 Australia, MSIA and HISA. With the

Add to Reading List

Source URL: www.ihe.net.au

Language: English - Date: 2014-11-30 10:40:49
117Symmetric-key algorithm / Key / Encryption / Cipher / Hardware security module / Advanced Encryption Standard / Key Wrap / Encrypting File System / Cryptography / Key management / Public-key cryptography

Guide to Data Field Encryption Contents Introduction 2

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2013-09-06 08:42:22
118Padding / Initialization vector / Block cipher / Symmetric-key algorithm / Cipher / Block size / Advanced Encryption Standard / PBKDF2 / Crypt / Cryptography / Stream cipher / Ciphertext

A Working Intro to Cryptography Illustrated with Python Kyle Isom

Add to Reading List

Source URL: samples.leanpub.com

Language: English - Date: 2014-02-07 22:13:09
119Technology / Human–computer interaction / Identification / Wireless / HMAC / Stream cipher / Electronic Product Code / Cryptography / Symmetric-key algorithm / Message authentication codes / Radio-frequency identification / Automatic identification and data capture

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
120Public-key cryptography / PGP / Pretty Good Privacy / Secure communication / Encryption software / Encryption / Cipher / Symmetric-key algorithm / Key exchange / Cryptography / Cryptographic software / Internet privacy

Securing Web Communications A Thesis in TCC 402 Presented to The Faculty of the

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-24 12:59:59
UPDATE