Symmetric-key cryptography

Results: 367



#Item
281Symmetric-key algorithm / NESSIE / SOBER / Cryptographic hash function / Anubis / Grand Cru / Hierocrypt / Nimbus / Cipher / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 18:26:12
282Advanced Encryption Standard / Serpent / LOKI / Differential cryptanalysis / MARS / RC6 / Symmetric-key algorithm / DEAL / UES / Cryptography / Block ciphers / Data Encryption Standard

Serpent and Smartcards Ross Anderson1 Eli Biham2 Lars Knudsen3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2000-03-11 06:42:23
283Encryption / Symmetric-key algorithm / Public-key cryptography / Encrypting File System / Index of cryptography articles / Cryptography / Cipher / Block cipher

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation NTT and Mitsubishi Electric Develop Advanced Encryption Scheme to Increase Cloud Computing Security

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2014-02-17 01:20:19
284Key / Symmetric-key algorithm / Scantegrity / Instant-runoff voting / Cryptography / Electronic voting / Randomness

Faster Print on Demand for Prˆet `a Voter Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague∗ October 29, 2013 Abstract

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:41:39
285Disk encryption / Symmetric-key algorithm / Block cipher / Cipher / Block size / Cryptographic hash function / AES implementations / Encryption software / Cryptography / Advanced Encryption Standard / Cryptographic software

White Paper Securing Data at the Speed of Light with gKrypt V1.2

Add to Reading List

Source URL: www.gkrypt.com

Language: English - Date: 2013-06-28 06:22:34
286Public-key cryptography / Key management / Symmetric-key algorithm / Transport Layer Security / Cipher / Block cipher / IPsec / Key / Padding / Cryptography / Cryptographic protocols / Internet protocols

X.509 IDEA Motivation and Study Techniques to help you learn, remember, and pass your technical exams!

Add to Reading List

Source URL: www.mindcert.com

Language: English - Date: 2009-05-16 10:43:08
287Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
288RC4 / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / Gilbert Vernam / KFB mode / Cryptography / Stream ciphers / Keystream

University of Salzburg, February 2, 2007 Design and Recent Analysis of eSTREAM Candidates Willi Meier

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
289Key / Symmetric-key algorithm / Probabilistic encryption / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
290Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
UPDATE