1![AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand](https://www.pdfsearch.io/img/94fd1ba69577de1927020bc2276f659e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2015-02-21 21:04:37
|
---|
2![A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University](https://www.pdfsearch.io/img/122e9c3ad6e61f035d03e1c1e7396677.jpg) | Add to Reading ListSource URL: www.cs.fsu.eduLanguage: English - Date: 2010-12-02 09:59:21
|
---|
3![Microsoft PowerPoint - abuse of cryptography.ppt Microsoft PowerPoint - abuse of cryptography.ppt](https://www.pdfsearch.io/img/c363d2398e1a25fb947cc3a6ad77c9fa.jpg) | Add to Reading ListSource URL: www.untruth.orgLanguage: English - Date: 2008-01-28 14:38:52
|
---|
4![The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway](https://www.pdfsearch.io/img/896841aaa8151a181d4e7d22de5fbaa6.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:22:52
|
---|
5![International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI](https://www.pdfsearch.io/img/e0e63e433172ca25de9b0d39dfc86ba6.jpg) | Add to Reading ListSource URL: www.tmrfindia.orgLanguage: English |
---|
6![The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2 The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2](https://www.pdfsearch.io/img/f7de2d69be253a390f19166186a60de4.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2012-05-16 03:26:41
|
---|
7![ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N](https://www.pdfsearch.io/img/ea93dffacbf38976d61d0d59fac84802.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2016-04-14 13:47:17
|
---|
8![AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz](https://www.pdfsearch.io/img/707b3b53bcc5960a8c39529e1ba0080f.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2015-10-15 15:27:48
|
---|
9![The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner](https://www.pdfsearch.io/img/a028d108a104cc9f2386c51f836b1f00.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2007-03-29 16:18:56
|
---|
10![The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1 The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1](https://www.pdfsearch.io/img/b71c0cfa09a02f9f94e53c5a09d84f2e.jpg) | Add to Reading ListSource URL: fse2012.inria.frLanguage: English - Date: 2012-03-23 10:23:39
|
---|