Symmetric-key cryptography

Results: 367



#Item
311Block cipher / Boomerang attack / Stream cipher / ICE / Advanced Encryption Standard / Cipher / Cryptanalysis / Symmetric-key algorithm / Chosen-plaintext attack / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Algebraic Techniques in Differential Cryptanalysis Martin Albrecht and Carlos Cid

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2009-03-31 06:03:14
312Cipher / Key size / Key / Encryption software / Symmetric-key algorithm / One-time pad / Brute-force attack / Export of cryptography in the United States / Encryption / Cryptography / Key management / Public-key cryptography

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
313Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
314Symmetric-key algorithm / Key size / Cipher / Block ciphers / Message authentication codes / Poly1305-AES / Differential cryptanalysis / Cryptography / Advanced Encryption Standard / Ciphertext

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Add to Reading List

Source URL: www2.cs.uni-paderborn.de

Language: English - Date: 2004-07-08 11:01:15
315Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
316Feistel cipher / Cipher / Key schedule / Block ciphers / Data Encryption Standard / Blowfish / Cryptography / ICE / Weak key

Sinople: a 128-bit symmetric block cipher

Add to Reading List

Source URL: www.philippepaquet.com

Language: English - Date: 2011-01-20 03:20:41
317Public-key cryptography / Disk encryption / Encryption software / Pretty Good Privacy / Encryption / Cipher / Key / Symmetric-key algorithm / Encrypting File System / Cryptography / Cryptographic software / Key management

October 2006 Number 270 DATA ENCRYPTION

Add to Reading List

Source URL: www.parliament.uk

Language: English - Date: 2010-04-21 07:32:22
318Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
319Symmetric-key algorithm / Block cipher / Camellia / Cryptographic hash function / Cipher / Cryptographic primitive / ESTREAM / Outline of cryptography / Crypto++ / Cryptography / Advanced Encryption Standard / Stream ciphers

Lightweight Cryptography for the Internet of Things Masanobu Katagi and Shiho Moriai Sony Corporation

Add to Reading List

Source URL: www.iab.org

Language: English - Date: 2011-03-25 11:03:50
320Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
UPDATE