Symmetric-key cryptography

Results: 367



#Item
51Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
52SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:42:19
53Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
54ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
55Living with post quantum cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
56Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
57Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
58Security not by chance: the AltusMetrum hardware true random number generator Tom Marble  DebConf 14

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
59Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-17 00:27:22
60LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02