Symmetric-key cryptography

Results: 367



#Item
181Block cipher / Forwarding information base / RSA / Symmetric-key algorithm / Key / Optimal asymmetric encryption padding / Cipher / Skype protocol / Format-preserving encryption / Cryptography / Public-key cryptography / Electronic commerce

Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:23
182Block cipher / Advanced Encryption Standard / ICE / Linear cryptanalysis / Symmetric-key algorithm / S-box / Key schedule / Cryptanalysis / Ciphertext / Cryptography / Data Encryption Standard / Differential cryptanalysis

Copyright 2004, The Mathematical Association of America. All rights reserved. First published in the American Mathematical Monthly. Reprinted by permission. Polynomials in the Nation’s Service: Using Algebra to Design

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:30:18
183Symmetric-key algorithm / Public key infrastructure / Key / Digital signature / Certificate policy / Ciphertext / X.509 / Cipher / Cryptosystem / Cryptography / Key management / Public-key cryptography

Overview of PKI for the CSOS Program

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:26:06
184Cipher / Key / Symmetric-key algorithm / Man-in-the-middle attack / Cryptographic key types / Cryptography / Key management / Public-key cryptography

algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography

Add to Reading List

Source URL: www.freewebs.com

Language: English
185Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
186Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:20:22
187Vincent Rijmen / Symmetric-key algorithm / Key size / Serpent / Triple DES / Twofish / Joan Daemen / Encryption software / XSL attack / Cryptography / Advanced Encryption Standard / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2001-04-12 08:18:08
188Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:39:19
189Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
190Key size / Key / Digital signature / Crypt / Symmetric-key algorithm / Book:Cryptography / Key Wrap / Cryptography / Key management / Public-key cryptography

Random Bit Generation (SP 800-90A, B and C)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:04:04
UPDATE