Symmetric-key cryptography

Results: 367



#Item
271Symmetric-key algorithm / Cryptography standards / Stream cipher / Block cipher / CRYPTREC / Cryptography / Public-key cryptography / Formal sciences

DOC Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
272Symmetric-key algorithm / Cipher / Encryption / PKCS / Advanced Encryption Standard / Encrypting File System / Network Security & Cryptography / Cryptography / Public-key cryptography / Disk encryption

Securing Data at Rest: Database Encryption Solution using Empress Embedded Database By: Srdjan Holovac © Empress Software Inc. June 2012

Add to Reading List

Source URL: www.empress.com

Language: English - Date: 2012-08-03 10:25:25
273Proprietary hardware / Software protection dongle / Warez / Smart card / Advanced Encryption Standard / Triple DES / Symmetric-key algorithm / Security token / CyaSSL / Cryptography / Cryptographic software / Copyright infringement of software

FEITIAN ROCKEY5 TIME -Cutting-edge solution with real-time clock Introduction ROCKEY5 TIME is a smart card dongle which

Add to Reading List

Source URL: www.proteccionsoftware.es

Language: English - Date: 2013-11-14 07:15:13
274Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
275Hashing / Block ciphers / SHA-1 / SHA-2 / Key size / Key schedule / Symmetric-key algorithm / RC4 / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Stream ciphers

Microsoft PowerPoint - preneel_lightweight_shanghaiv1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-10-21 10:42:25
276Disk encryption / Special purpose file systems / Encrypting File System / Pretty Good Privacy / Cipher / Encryption software / Email encryption / Symmetric-key algorithm / Filesystem-level encryption / Cryptography / Cryptographic software / Public-key cryptography

DOC Document

Add to Reading List

Source URL: www.netaction.org

Language: English - Date: 2007-08-27 11:25:52
277Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
278Symmetric-key algorithm / Public-key cryptography / FIPS 140-2 / Cryptographic protocol / Cryptoperiod / Digital signature / Cryptographic key types / CRYPTREC / Cryptography / Key management / Key

Recommendation for Cryptographic Key Generation

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-04-17 09:08:42
279Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
280Symmetric-key algorithm / Cipher / LORAN / Key / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: waas.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
UPDATE