Symmetric-key cryptography

Results: 367



#Item
21Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
22Cryptography / Computing / Cryptographic protocols / Internet protocols / Secure communication / Computer networking / Named data networking / Public-key cryptography / Encryption / Key / Symmetric-key algorithm / IPsec

A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2011-11-01 01:23:50
23

Cube Testers and Key Recovery in Symmetric Cryptography Willi Meier

Add to Reading List

Source URL: indocrypt09.inria.fr

Language: English - Date: 2009-12-18 10:33:52
    24Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

    CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-11-08 15:42:56
    25Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

    JuneEncryption as an Abstract Datatype: an extended abstract

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    26Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

    A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    27Cryptography / Public-key cryptography / Key management / Key / Public key infrastructure / Elliptic curve cryptography / Digital signature / Smart grid / Meter data management / Symmetric-key algorithm / Computer security / Smart meter

    Certicom AMI 7000 data sheet-front-rev10

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2009-06-02 19:28:55
    28

    Symmetric-key Cryptography: an Engineering Perspective

    Add to Reading List

    Source URL: ask2014.iiitd.ac.in

    Language: English - Date: 2015-01-07 00:57:16
      29Cryptography / Cloud computing / Key management / Public-key cryptography / Cloud computing security / Computer security / Encryption / Symmetric-key algorithm / Key / Disk encryption / Database encryption

      Microsoft PowerPoint - Copy of slides.ppt

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-11-27 08:33:14
      30Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

      Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

      Add to Reading List

      Source URL: ect.bell-labs.com

      Language: English - Date: 2010-12-15 21:38:44
      UPDATE