Symmetric-key cryptography

Results: 367



#Item
61Cipher / Symmetric-key algorithm / Data security / Disk encryption / Cryptography / Cryptographic software / Public-key cryptography

Brochure_VMEOffice_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:28
62Cipher / Block cipher / Stream cipher / Substitution cipher / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Symmetric-key algorithm / Ciphertext

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16
63Cipher / Cryptanalysis / Symmetric-key algorithm / RC4 / Encryption software / Index of cryptography articles / Differential cryptanalysis / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
64Public-key cryptography / Key / Authentication / Digital signature / Symmetric-key algorithm / Hardware random number generator / Counterfeit / Index of cryptography articles / Cryptography / Key management / Notary

Advanced security prevents counterfeit products

Add to Reading List

Source URL: www.insidesecure.com

Language: English
65Computer security / Email authentication / Public-key cryptography / Encryption / Secure communication / Tor / Cipher / Symmetric-key algorithm / Email encryption / Cryptography / Internet privacy / Cryptographic software

ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
66Key size / Cryptosystem / Encryption / Data Encryption Standard / Key / Smart card / Symmetric-key algorithm / NSA encryption systems / Network Security & Cryptography / Cryptography / Key management / Public-key cryptography

PIN Security Requirements

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
67Science / Mathematical sciences / Cyberwarfare / Index of cryptography articles / One-time pad / Cryptography / Cipher / Symmetric-key algorithm

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:02
68Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
69Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
70Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
UPDATE