Block cipher modes of operation

Results: 320



#Item
251Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
252Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
253CBC-MAC / Padding / Ciphertext / Hash function / Probabilistic encryption / One-way compression function / Cryptography / Block cipher modes of operation / Message authentication codes

CS255: Cryptography and Computer Security Winter 2012 Assignment #2 Due: 5pm Friday, Feb. 17, 2012.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-09 13:04:29
254Electronic commerce / Semantic security / CBC-MAC / RSA / Chosen-plaintext attack / Malleability / Index of cryptography articles / Cryptography / Public-key cryptography / Block cipher modes of operation

CS255: Cryptography and Computer Security Winter 2011 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-29 15:51:55
255Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-03-10 01:08:56
256Secure communication / IEEE P1619 / Block cipher modes of operation / Cipher / Message authentication codes

2003 Paper 3 Question 9 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:38
257Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
258Block cipher modes of operation / CCM mode / Data Encryption Standard / Verilog / VHDL / Message authentication codes / Cryptography / Hardware description languages / Advanced Encryption Standard

CCM1 Generic CCM AES Cores

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 22:58:28
259Data Encryption Standard / Verilog / Message authentication codes / Galois/Counter Mode / CCM mode / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

GCE1 Core AES-GCM/CCM/CCM*/EAX’ Core

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 22:59:04
260Ciphertext / Pseudorandom number generator / Cipher / RC6 / One-time pad / Block cipher modes of operation / Cryptography / Initialization vector / Advanced Encryption Standard

Randomness Testing of the Advanced Encryption Standard Finalist Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
UPDATE