Advanced Encryption Standard

Results: 1268



#Item
31Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
32Pseudorandom permutation / Advanced Encryption Standard / Ciphertext stealing / Data Encryption Standard / RSA / Advantage / Parity of a permutation / Block cipher / GOST

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
33Symmetric-key algorithm / RSA / Security Target / Evaluation / Common Criteria / Advanced Encryption Standard / FIPS 140-2

centercenterSupporting Document Mandatory Technical Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:10
34Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / SHA-1 / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:48:48
35Disk encryption / Encryption / Advanced Encryption Standard / Data Encryption Standard / IEEE P1619 / Cold boot attack

Microsoft Word - eNovatech_ASUS FINAL_1.doc

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:11
36Educational psychology / Education in Canada / Education in the United States / General Educational Development / Student rights in higher education / Reasonable accommodation / Educational technology / Advanced Encryption Standard

Strategies for Facilitating the Accommodation Process Be proactive – put a disability statement on your syllabus: Example: If you have special needs that may require modification of instruction or assessment, please n

Add to Reading List

Source URL: aes.iupui.edu

Language: English - Date: 2011-02-07 14:06:46
37Cryptography standards / Cryptographic hash functions / Cryptography / FIPS 140-2 / FIPS 140 / SHA-2 / SHA-1 / Cryptographic Module Validation Program / Advanced Encryption Standard / Secure Hash Algorithm / Data Encryption Standard

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
38CINVESTAV / Instituto Politcnico Nacional / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Algorithm / Block cipher / Field-programmable gate array / Elliptic curve cryptography / Reconfigurable computing / Cryptographic engineering

Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2007-02-03 23:20:56
39Mathematical optimization / Applied mathematics / Cryptography / Operations research / Search algorithms / Cryptanalysis / Metaheuristic / Linear cryptanalysis / Advanced Encryption Standard / Genetic algorithm

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
40Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
UPDATE