Symmetric-key cryptography

Results: 367



#Item
241Block cipher / CBC-MAC / Cryptographic hash function / Symmetric-key algorithm / Advantage / Cipher / CMAC / Index of cryptography articles / Cryptography / Block cipher modes of operation / Message authentication codes

Comments on NIST’s RMAC Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:27:22
242EAX mode / Authenticated encryption / OCB mode / Block cipher / Data Encryption Standard / NTRU / Advanced Encryption Standard / Block size / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / CCM mode

Public Comments on Draft Special Publication 800-38C[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:46:32
243Authenticated encryption / Block cipher / Symmetric-key algorithm / EAX mode / Galois/Counter Mode / Cryptography / Block cipher modes of operation / CCM mode

NIST Responses to Public Comments on Draft SP 800-38C (May 2004)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:25:50
244Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
245Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
246Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
247Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
248Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
249Transport Layer Security / Public key infrastructure / Digital signature / Symmetric-key algorithm / Public key certificate / Crypt / Key size / Network Security Services / Certificate server / Cryptography / Public-key cryptography / Key management

Canada Customs Agence des douanes and Revenue Agency et du revenu du Canada Unclassified

Add to Reading List

Source URL: www.cra-arc.gc.ca

Language: English - Date: 2005-10-29 12:08:24
250Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
UPDATE