Symmetric-key cryptography

Results: 367



#Item
151Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
152Public-key cryptography / Cipher / Triple DES / Symmetric-key algorithm / Block cipher / Blowfish / Key size / Key / Advanced Encryption Standard / Cryptography / Key management / Data Encryption Standard

Volume 2, Issue 7, July[removed]ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering

Add to Reading List

Source URL: www.ijarcsse.com

Language: English - Date: 2014-02-16 11:55:40
153Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
154Key Wrap / Key / Public-key cryptography / Symmetric-key algorithm / Cryptography / Key management / Disk encryption

FDEiTC-EE-English-001 v0[removed]

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-08-22 15:49:25
155Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
156Cryptographic software / Key / Symmetric-key algorithm / Cipher / RSA / Encrypting File System / PKCS / Cryptography / Public-key cryptography / Key management

Cryptographic Services Guide Contents About Cryptographic Services 5

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2015-02-09 20:58:05
157Encryption / Cryptographic software / Special purpose file systems / Disk encryption / Deterministic encryption / Cryptography / Public-key cryptography / Symmetric-key algorithm

Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola (JHU) Juan Garay (Bell Labs) Seny Kamara (JHU) Rafail Ostrovsky (UCLA)

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-12-04 11:48:45
158Symmetric-key algorithm / Cryptanalysis / Cipher / Novotel / Stream cipher / Cryptography / Block cipher / Serge Vaudenay

FSE 2013 Program Welcome reception will be at poolside of Novotel, and all technical sessions will be at Cinnamon Room of Novotel. The program is available in PDF. Sunday, 10 March 2013 •

Add to Reading List

Source URL: fse2013.spms.ntu.edu.sg

Language: English - Date: 2013-03-09 04:59:44
159Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
160Cipher / Feistel cipher / Symmetric-key algorithm / QUAD / Public-key cryptography / Cryptanalysis / Vigenère cipher / Index of cryptography articles / Cryptography / Stream ciphers / Block cipher

A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
UPDATE