Symmetric-key cryptography

Results: 367



#Item
301Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
302Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
303Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
304Public-key cryptography / Key size / Cryptanalysis / Cypherpunk / Key exchange / Symmetric-key algorithm / Bruce Schneier / Key / Block cipher / Cryptography / Key management / Whitfield Diffie

Foreword By Whitfield Diffie The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less

Add to Reading List

Source URL: www.cse.iitk.ac.in

Language: English - Date: 2009-10-10 01:49:56
305Cryptographic hash function / Block cipher / Password / Crypt / Key size / Key / Cipher / SHA-1 / Padding / Cryptography / Symmetric-key algorithm / Advanced Encryption Standard

maXbox Starter 13 Start with Crypto Programming 1.1 Set a Cipher

Add to Reading List

Source URL: www.softwareschule.ch

Language: English - Date: 2012-01-20 05:07:53
306Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
307Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
308Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
309Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
310Block cipher / Cryptanalysis / Symmetric-key algorithm / Cipher / One-time pad / Padding / Index of cryptography articles / FEAL / Cryptography / Differential cryptanalysis / Eli Biham

Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti

Add to Reading List

Source URL: webcourse.cs.technion.ac.il

Language: English - Date: 2006-11-05 09:06:55
UPDATE