Symmetric-key cryptography

Results: 367



#Item
201Block cipher / Key generation / Symmetric-key algorithm / Random number generation / Pseudorandomness / Key / Public-key cryptography / Cryptographically secure pseudorandom number generator / Cryptography standards / Cryptography / Key management / Randomness

Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:04:24
202Symmetric-key algorithm / Cipher / Crypt / Feistel cipher / Block cipher / Key size / RC5 / ICE / Key / Cryptography / Key management / Blowfish

American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

Add to Reading List

Source URL: www.ajer.org

Language: English - Date: 2014-07-28 18:08:04
203Data security / Symmetric-key algorithm / CRYPTREC / Encryption software / Information security / Disk encryption / Block cipher / Triple DES / Encryption / Cryptography / Security / Cryptographic software

Guideline on Protection of Personal Information in Telecommunications Business - Efforts with Security Control Measures to Prevent Personal Information Leakage - 1. Main Points of Revised Guideline The Ministry of Intern

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2011-06-27 13:15:06
204CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
205Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
206Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
207Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
208Cryptographic hash functions / CRYPTREC / Key management / Pseudorandom number generators / Symmetric-key algorithm / Hierocrypt / Stream cipher / Key size / SHA-2 / Cryptography / Cryptography standards / Block ciphers

Report on Evaluation of Symmetric-Key Cryptographic Techniques May 22, 2003 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
209Block cipher / Linear cryptanalysis / Cryptanalysis / Symmetric-key algorithm / COCONUT98 / CIPHERUNICORN-E / Cryptography / Differential cryptanalysis / CIPHERUNICORN-A

Report on Present State of CIPHERUNICORN-A Cipher Evaluation (full evaluation) January 28, 2002 Masayuki Kanda, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
210Symmetric-key algorithm / Block ciphers / Stream ciphers / Outline of cryptography / Cryptography / CRYPTREC / Cipher

Role of Cryptographic Evaluations in e-Japan Strategy January 28, 2002 Hidetoshi Ono, Director, Office of IT Security Policy, Ministry of Economy, Trade and Industry

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
UPDATE