Symmetric-key cryptography

Results: 367



#Item
71Public-key cryptography / Key / Symmetric-key algorithm / Proxy re-encryption / ID-based encryption / Cryptography / Key management / Cipher

DATA CENTER Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

Add to Reading List

Source URL: www.brocade.com

Language: English - Date: 2014-10-16 13:08:00
72Symmetric-key algorithm / Cryptographic hash function / Authenticated encryption / Cipher / Public-key cryptography / Random oracle / Cryptography / Encryption / Advanced Encryption Standard

ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au Paper

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2015-04-12 20:54:57
73Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
74Cipher / Block cipher / Public-key cryptography / Key / RSA / Substitution cipher / One-time pad / Stream cipher / Index of cryptography articles / Cryptography / Symmetric-key algorithm / Ciphertext

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
75Quantum information science / Cryptographic protocols / Quantum key distribution / Secure Communication based on Quantum Cryptography / Symmetric-key algorithm / Public-key cryptography / Key size / Key distribution / Key-agreement protocol / Cryptography / Key management / Quantum cryptography

SECOQC White Paper on Quantum Key Distribution and Cryptography Reference: Secoqc-WP-v5 Document type: White Paper Document Date: January

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
76Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
77FIPS 140-2 / Cryptographic primitive / Block cipher / Key generation / Key / Symmetric-key algorithm / Random number generation / Algorithm / Computer security / Cryptography / Key management / Formal sciences

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-12-30 15:45:55
78Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
79Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
80National Security Agency / Block ciphers / Skipjack / Capstone / Fortezza / Key size / CDMF / Key / Symmetric-key algorithm / Cryptography / Key management / Data Encryption Standard

How to Reverse Engineer an EES Device Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:49
UPDATE