Symmetric-key cryptography

Results: 367



#Item
21FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
22A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti  Yanbin Lu

A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2011-11-01 01:23:50
23Cube Testers and Key Recovery in Symmetric Cryptography Willi Meier

Cube Testers and Key Recovery in Symmetric Cryptography Willi Meier

Add to Reading List

Source URL: indocrypt09.inria.fr

Language: English - Date: 2009-12-18 10:33:52
    24CERTICOM WHITEPAPER SERIES  ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-11-08 15:42:56
    25JuneEncryption as an Abstract Datatype: an extended abstract

    JuneEncryption as an Abstract Datatype: an extended abstract

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    26A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    27Certicom AMI 7000 data sheet-front-rev10

    Certicom AMI 7000 data sheet-front-rev10

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2009-06-02 19:28:55
    28Symmetric-key Cryptography: an Engineering Perspective

    Symmetric-key Cryptography: an Engineering Perspective

    Add to Reading List

    Source URL: ask2014.iiitd.ac.in

    Language: English - Date: 2015-01-07 00:57:16
      29Microsoft PowerPoint - Copy of slides.ppt

      Microsoft PowerPoint - Copy of slides.ppt

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-11-27 08:33:14
      30Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research  Alan Jeffrey

      Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

      Add to Reading List

      Source URL: ect.bell-labs.com

      Language: English - Date: 2010-12-15 21:38:44