Symmetric-key cryptography

Results: 367



#Item
161Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
162Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
163Internet protocols / Computer network security / Public-key cryptography / IPsec / Transport Layer Security / Key / Symmetric-key algorithm / Internet security / Encryption / Cryptography / Cryptographic protocols / Key management

ABSTRACT This primer addresses the use of encryption systems within control systems environments of the U.S. critical infrastructure. Control systems have operating parameters that differ significantly from traditional

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-11 16:59:47
164Initialization vector / Smart card / Subscriber identity module / Symmetric-key algorithm / RSA / Cipher / Cryptography / Public-key cryptography / PKCS

Unpicking PLAID A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele1 Victoria Fehr2 Felix Günther2 Giorgia Azzurra Marson2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-27 08:26:56
165Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
166Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
167Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
168Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
169Public-key cryptography / Symmetric-key algorithm / Disk encryption / Encryption software / Key / ID-based encryption / Block cipher / Encryption / Pretty Good Privacy / Cryptography / Cipher / Key generation

CTO Corner September 2014 Why Encryption Is Essential and How to Address Potential Vulnerabilities Dan Schutzer, Senior Technology Consultant, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2014-09-23 08:09:57
170Encryption / Cipher / Cryptanalysis / Advanced Encryption Standard / Index of cryptography articles / Cryptography / Ciphertext / Symmetric-key algorithm

JOINT SCHEMES FOR PHYSICAL LAYER SECURITY AND ERROR CORRECTION Oluwayomi Bamidele Adamo, B.S., M.S. Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 16:04:57
UPDATE