Symmetric-key cryptography

Results: 367



#Item
81Internet standards / Cryptographic protocols / Transport Layer Security / Symmetric-key algorithm / Internet security / Digital signature / Cipher / Key / Encryption / Cryptography / Public-key cryptography / Key management

Guide to Mobile Internet Security Guide to Mobile Internet Security Table of Contents 1. 1 Introduction..................................................................................................................

Add to Reading List

Source URL: www.kannel.org

Language: English - Date: 2014-11-12 00:04:51
82Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
83Cipher / Symmetric-key algorithm / Data security / Disk encryption / Cryptography / Cryptographic software / Public-key cryptography

Brochure_VMEOffice_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:30
84Block cipher modes of operation / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Block cipher / Symmetric-key algorithm / RSA / Stream ciphers / Ciphertext stealing / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
85ICE / Ciphertext / Stream cipher / Chosen-plaintext attack / Blowfish / Cryptanalysis / Linear cryptanalysis / Cipher / Symmetric-key algorithm / Cryptography / Block cipher / Differential cryptanalysis

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
86Key / Advanced Encryption Standard / Symmetric-key algorithm / Encryption / Public-key cryptography / Disk encryption / Key Wrap / Encrypting File System / Cryptography / Key management / Derived unique key per transaction

Visa Europe’s Best Practices for Data Field Encryption, Version 1

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
87Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
88Field-programmable gate array / Xilinx / Symmetric-key algorithm / Key / Public-key cryptography / Block cipher / Brute-force attack / Partial re-configuration / Cryptography / Key management / Reconfigurable computing

Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable Device

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-06-04 18:22:14
89Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
90Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 09:18:30
UPDATE