Symmetric-key cryptography

Results: 367



#Item
31Cryptography / Block cipher modes of operation / Ciphertext stealing / Ciphertext / Symmetric-key algorithm / Initialization vector

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-03-23 10:23:39
32Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
33Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
34Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

PDF Document

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:38
35Cryptography / Block ciphers / Advanced Encryption Standard / Vincent Rijmen / Symmetric-key algorithm / Joan Daemen / Data Encryption Standard / Key schedule / Q / ARIA / Cipher / Serpent

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-09-20 15:54:41
36Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:23
37Block cipher / Symmetric-key algorithm / Ubiquitous computing / Computer security / Workshop on Cryptographic Hardware and Embedded Systems / Science / Mathematical sciences / Security / Cryptography / Cipher

Some Experimental Results on Attacking HFE with Buchberger Algorithm

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-01-18 19:29:59
38RSA / Ciphertext / Key / Randomness extractor / Symmetric-key algorithm / Semantic security / Cryptography / Key management / Ciphertext indistinguishability

Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt† Hoeteck Wee‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-09 09:25:45
39Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
40Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

Add to Reading List

Source URL: securitydriven.net

Language: English - Date: 2015-04-04 22:36:18
UPDATE