Symmetric-key cryptography

Results: 367



#Item
41A SYMMETRIC KEY ENCRYPTION ALGORITHM  MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:45
42CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
43Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin  Alina Oprea

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2005-09-02 12:11:39
44Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
45Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-10-10 11:05:41
46Category 5 Part 1 – “Telecommunications” 5D001 “Software” ECCN 5D001 is amended by removing and reserving Items paragraph .b, “Software” “specially designed” or modified to support “technology” cont

Category 5 Part 1 – “Telecommunications” 5D001 “Software” ECCN 5D001 is amended by removing and reserving Items paragraph .b, “Software” “specially designed” or modified to support “technology” cont

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-20 20:28:31
471234145467836391829836846489A2BCBD183  École doctorale nO 84 : Sciences et technologies de l’information et de la communication  Doctorat ParisTech

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
48Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
49This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
501 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36