Block cipher

Results: 1020



#Item
61

Practical attack on 8 rounds of the lightweight block cipher KLEIN Jean-Philippe Aumasson1 , Mar´ıa Naya-Plasencia2,∗ , and Markku-Juhani O. Saarinen3 1

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:40
    62Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

    ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-14 13:47:17
    63Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

    battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:34:12
    64Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

    Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:37:38
    65Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

    FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2012-05-16 03:47:37
    66Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

    AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-10-15 15:27:48
    67Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

    Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Add to Reading List

    Source URL: isi.jhu.edu

    Language: English - Date: 2016-03-21 17:23:50
    68Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

    Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:50:20
    69Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

    Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-12-11 07:25:27
    70Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

    Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2015-09-17 04:43:33
    UPDATE