Symmetric-key cryptography

Results: 367



#Item
291Data Encryption Standard / Symmetric-key algorithm / Cryptography / Ciphertext / Cipher

2008 Paper 3 Question 8 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:47
292Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
293Substitution cipher / Cryptanalysis / Cipher / Transposition cipher / Caesar cipher / Symmetric-key algorithm / Known-plaintext attack / Index of cryptography articles / Multiple encryption / Cryptography / Ciphertext / Chosen-plaintext attack

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:21:59
294Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:03
295Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
296Key encapsulation / Electronic commerce / ID-based encryption / Optimal asymmetric encryption padding / Key size / RSA / Symmetric-key algorithm / XTR / ID-based cryptography / Cryptography / Key management / Public-key cryptography

SK-KEM : AN IDENTITY-BASED KEM M. BARBOSA, L. CHEN, Z. CHENG, M. CHIMLEY, A. DENT, P. FARSHIM, K. HARRISON, J. MALONE-LEE, N.P. SMART, AND F. VERCAUTEREN

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:36
297Block cipher / Ciphertext stealing / Data Encryption Standard / Cipher / Symmetric-key algorithm / Block size / IEEE P1619 / Intel Cascade Cipher / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

LNCS[removed]Memory Encryption for Smart Cards

Add to Reading List

Source URL: emsec.rub.de

Language: English - Date: 2012-01-16 04:35:17
298PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
299Tiny Encryption Algorithm / Cipher / Block cipher / Stream cipher / Impossible differential cryptanalysis / Chosen-plaintext attack / Differential cryptanalysis / International Data Encryption Algorithm / Cryptanalysis / Cryptography / XTEA / Symmetric-key algorithm

A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

Add to Reading List

Source URL: www.csshl.net

Language: English - Date: 2011-10-26 10:07:40
300Quantum information science / Cryptographic protocols / Quantum key distribution / Secure Communication based on Quantum Cryptography / Symmetric-key algorithm / Public-key cryptography / Key size / Key distribution / Key-agreement protocol / Cryptography / Key management / Quantum cryptography

SECOQC White Paper on Quantum Key Distribution and Cryptography

Add to Reading List

Source URL: www.secoqc.net

Language: English - Date: 2008-05-06 12:12:25
UPDATE