Symmetric-key cryptography

Results: 367



#Item
191Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-06 11:45:48
192Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
193Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
194Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
195Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
196Key management / Computer security / Digital signature / Non-repudiation / Public key certificate / Symmetric-key algorithm / Collision attack / Cryptography / Public-key cryptography / Notary

Security Record Kevin Wilson Greg Cannon Jeff Stapleton Anne Wang

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2005-12-08 15:19:37
197Block cipher modes of operation / Block cipher / Data Encryption Standard / Block size / Symmetric-key algorithm / Galois/Counter Mode / Encryption software / Cryptography / Advanced Encryption Standard / AES implementations

NPS-MA[removed]NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2009-07-31 14:17:57
198Ciphertext / Cipher / RC4 / One-time pad / Block cipher / KFB mode / Cryptography / Stream ciphers / Symmetric-key algorithm

Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:25:02
199Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
200Key size / Key / Cryptographic hash function / Symmetric-key algorithm / RSA / Cipher / Digital signature / PKCS / Crypt / Cryptography / Key management / Public-key cryptography

Comments received on SP[removed], Part 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 12:25:12
UPDATE