Data Encryption Standard

Results: 514



#Item
21Cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Semantic security / Cryptosystem / RSA / Data Encryption Standard

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
22Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
23Data Encryption Standard / Vehicle registration plate / Privacy of telecommunications

CHAPTER 38 Department of Public Safety (Statutory Authority: 1976 Code §§ 23–6–10 et seq. and 23–47–20(CARTICLE 1

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2016-05-06 09:06:16
24Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-05 03:04:49
25Cryptography / Applied mathematics / Data Encryption Standard / Cryptanalysis / Block cipher / Linear cryptanalysis / Differential cryptanalysis / S-box

Automatic tool for differential cryptanalysis of SPNs Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
26Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2010-12-10 03:09:04
27Computing / Cloud computing / Cloud infrastructure / Cloud storage / File hosting service / Data security / Advanced Encryption Standard / Cloud computing security / IEEE Cloud Computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:45
28Cryptography / Key management / Applied mathematics / Cryptographic software / Symmetric-key algorithm / Cipher / Key size / Block cipher / Key / Public-key cryptography / Encryption / Data Encryption Standard

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
29Pseudorandom number generators / Cryptography / Theoretical computer science / Applied mathematics / Random number generation / Mersenne Twister / Pseudorandomness / Algorithm / Data Encryption Standard / Linear-feedback shift register / Reconfigurable computing / TestU01

Design & Implementation of Well-Method for Embedded Generation of LPR Numbers Venkateshwarlu Purumala M.Tech, VLSI & Embedded Systems DVR College of Engineering and Technology,

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:51
30Cryptography / Project 25 / Data Encryption Standard / Advanced Encryption Standard / Cryptographic software / Block ciphers / Disk encryption / NSA encryption systems / FASCINATOR

The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

Add to Reading List

Source URL: www.efjohnson.com

Language: English - Date: 2011-08-21 12:33:27
UPDATE