Symmetric-key cryptography

Results: 367



#Item
11Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Symmetric-key algorithm / Cryptanalysis / Public-key cryptography / Stream cipher / Cipher / Hash function / Tiny Encryption Algorithm / Index of cryptography articles

An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:02
12Cryptography / Symmetric-key algorithm / Cipher / Encryption / Public-key cryptography / RSA / Key / Block cipher mode of operation / Multiple encryption

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
13Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
14Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
15

ICS423: Data Security and Cryptography I Synopsis History of secret communication and confidential data storage. Elements of cryptography and cryptanalysis. Classical ciphers. Symmetric key cryptography. Public key crypt

Add to Reading List

Source URL: www.asecolab.org

- Date: 2015-08-25 22:40:59
    16Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

    Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

    Add to Reading List

    Source URL: ctcrypt.ru

    Language: English - Date: 2016-06-10 06:35:42
    17Cryptography / Key management / Wireless networking / Building automation / Home automation / Block cipher / Symmetric-key algorithm / Skipjack / Encryption / Blowfish / Message authentication code / Data Encryption Standard

    On the Security of Intra-Car Wireless Sensor Networks

    Add to Reading List

    Source URL: www.csie.ntu.edu.tw

    Language: English - Date: 2014-04-11 22:39:21
    18Authenticated encryption / Symmetric-key cryptography / Block cipher / Public-key cryptography / Cryptography / Transport Layer Security

    Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-09-10 11:24:57
    19Cryptography / Disk encryption / Cryptographic software / Public-key cryptography / Data security / Encryption / Linear Tape-Open / IEEE P1619 / Symmetric-key algorithm / Magnetic tape data storage / Cipher / Key

    Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

    Add to Reading List

    Source URL: www.lto.org

    Language: English - Date: 2014-09-08 23:31:20
    20Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

    ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-14 13:47:17
    UPDATE