Symmetric-key cryptography

Results: 367



#Item
41MULTI-S01 / Linear feedback shift register / Symmetric-key algorithm / Block cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Finite fields / Stream ciphers

A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:45
42Ciphertext indistinguishability / IP / Oracle machine / Mathematics / Cryptography / Advantage / Applied mathematics

CS 276: Cryptography Lecture Notes Todd Kosloff February 18, 2004 First Half Last time, we talked about definitions of security for symmetric key cryptosystems. We can use these definitions to prove that various

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
43Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2005-09-02 12:11:39
44Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
45Block cipher / Cipher / RSA / Authenticated encryption / Symmetric-key algorithm / Key size / Provable security / Key / Cryptographic protocol / Cryptography / Block cipher modes of operation / Public-key cryptography

Authenticated Encryption in Theory and in Practice Jean Paul Degabriele Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-10-10 11:05:41
46Cryptography / Cryptanalysis / Export Control Classification Number / Symmetric-key algorithm / Espionage / Mathematical sciences / Science

Category 5 Part 1 – “Telecommunications” 5D001 “Software” ECCN 5D001 is amended by removing and reserving Items paragraph .b, “Software” “specially designed” or modified to support “technology” cont

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-20 20:28:31
47Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Zero-knowledge proof / ElGamal encryption / Symmetric-key algorithm / RSA / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext indistinguishability

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
48Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
49Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
50Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
UPDATE