Symmetric-key cryptography

Results: 367



#Item
261Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
262Keystream / Block cipher / A5/1 / Symmetric-key algorithm / Salsa20 / Caesar cipher / Substitution cipher / RC4 / Cryptography / Stream ciphers / Cipher

Analysis of Lightweight Stream Ciphers PhD public defense Simon Fischer EPFL and FHNW April 18th 2008

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-04-17 18:36:42
263Trivium / ICE / Initialization vector / VEST / Weak key / Block cipher / Symmetric-key algorithm / Cryptography / Stream ciphers / Grain

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
264TrueCrypt / Key / Cipher / Symmetric-key algorithm / Public-key cryptography / Encryption / Integrated Encryption Scheme / Chosen-ciphertext attack / Disk encryption / Cryptography / Computer security / Trusted Platform Module

1 Deleting Secret Data with Public Verifiability Feng Hao, Member, IEEE, Dylan Clarke, Avelino Francisco Zorzo Abstract The problem of secure data erasure has been extensively studied in the past with a rich body of lit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-25 03:36:16
265Internet protocols / Computer network security / Public-key cryptography / IPsec / Transport Layer Security / Key / Symmetric-key algorithm / Internet security / Encryption / Cryptography / Cryptographic protocols / Key management

ABSTRACT This primer addresses the use of encryption systems within control systems environments of the U.S. critical infrastructure. Control systems have operating parameters that differ significantly from traditional

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-11 16:59:47
266Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / Cipher / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Electronic commerce

Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 14:27:26
267Key / Symmetric-key algorithm / PKCS / Deniable authentication / Cryptography / Key management / Public-key cryptography

Cryptography basics - By a noob, for the noobs

Add to Reading List

Source URL: hackstub.netlib.re

Language: English - Date: 2013-07-11 18:11:49
268Symmetric-key algorithm / Stream cipher / Cryptography standards / Block cipher / CRYPTREC / Cryptography / Public-key cryptography / Formal sciences

Guidelines for Preparing Cryptographic Techniques Application Documents (Provisional Translation) June, 2000

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
269Cryptographic hash function / Key size / Block cipher / CRYPTREC / FIPS 140-2 / Cryptography / Cryptographic primitive / Symmetric-key algorithm

Procedure for submitting cryptographic techniques (Provisional Translation) Information-technology Promotion Agency, Japan June 13, 2000 Final Version July 5, [removed]Purpose of this Project

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
270Cryptographic hash function / Block cipher / Cryptographic primitive / Pseudorandom number generator / Stream cipher / Digital signature / Key size / CRYPTREC / FIPS 140-2 / Cryptography / Key management / Symmetric-key algorithm

Procedure for submitting cryptographic techniques (Provisional Translation) Information-technology Promotion Agency, Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
UPDATE