Block cipher

Results: 1020



#Item
51Cryptography / Applied mathematics / Stream ciphers / Public-key cryptography / E-commerce / RSA / Cryptanalysis / Vigenre cipher / Block cipher / Cipher / Hill cipher / Finite field

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
52Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
53Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
54Disk encryption / Encryption / Block cipher mode of operation / Advanced Encryption Standard / Storage security / Cryptography / Data Encryption Standard / Hardware-based full disk encryption / Disk encryption hardware

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
55Cryptographic protocols / Key management / Internet protocols / IPsec / Cryptography / Internet Key Exchange / DiffieHellman key exchange / Password / Key / FIPS 140-2 / Block cipher mode of operation / Transport Layer Security

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24
56Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
57Block ciphers / Cryptography / Free software / Serpent / Data Encryption Standard / Python / Cipher / Crypt / Advanced Encryption Standard / Reference implementation / Python syntax and semantics

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
58Authenticated encryption / Symmetric-key cryptography / Block cipher / Public-key cryptography / Cryptography / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-10 11:24:57
59Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
60Public-key cryptography / Secure multi-party computation / Homomorphic encryption / Algorithm / Block cipher mode of operation / Communications protocol / Cryptographic protocol

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34
UPDATE