Symmetric-key cryptography

Results: 367



#Item
321Public-key cryptography / Key / Symmetric-key algorithm / One-time pad / Trusted Platform Module / Cryptography / Computer security / Trusted Computing

Trusted Computing IY5608: The RTM and the TPM Infrastructure Working Group Activity

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-02-14 11:20:25
322PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-30 12:10:14
323Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2008-11-03 10:06:11
324Vigenère cipher / Hill cipher / Cryptanalysis / Rotor machine / Caesar cipher / Symmetric-key algorithm / Atbash / Enigma machine / Data Encryption Standard / Cryptography / Substitution cipher / Cipher

History of Cryptography This article is dedicated to a short history of cryptography, from ancient times to our days, without the

Add to Reading List

Source URL: www.logicalsecurity.com

Language: English - Date: 2008-09-10 02:14:47
325Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
326Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
327Py / Bart Preneel / Block cipher / Differential cryptanalysis / Differential-linear attack / COSIC / Symmetric-key algorithm / Cipher / Keystream / Cryptography / Stream ciphers / Phelix

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
328Cryptographic hash functions / HMAC / Key / Symmetric-key algorithm / SHA-2 / Ciphertext / Public-key cryptography / Index of cryptography articles / Book:Cryptography / Cryptography / Message authentication codes / Hashing

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
329PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-09-27 12:26:08
330Atmel AVR / Symmetric-key algorithm / Padding / Advanced Encryption Standard / CMAC / Cipher / Key size / Cryptography / Message authentication codes / Key management

AVR411: Secure Rolling Code Algorithm for Wireless Link Features

Add to Reading List

Source URL: www.atmel.com

Language: English - Date: 2012-12-08 06:56:50
UPDATE