Data Encryption Standard

Results: 514



#Item
51Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
52Payment systems / E-commerce / Cryptography / Tokenization / Payment Card Industry Data Security Standard / Heartland Payment Systems / Credit card / Data security / Debit card / Point to Point Encryption / Payment terminal

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness The Next Step: Complete Data Security 17 Aug:25 PM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:26:10
53Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
54Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
55Reconfigurable computing / Fabless semiconductor companies / Field-programmable gate array / Disk encryption / Xilinx / Altera / Virtex / Bitstream / Data Encryption Standard / Galois/Counter Mode / Encryption / BitLocker

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2016-02-23 14:14:05
56Pseudorandom permutation / Advanced Encryption Standard / Ciphertext stealing / Data Encryption Standard / RSA / Advantage / Parity of a permutation / Block cipher / GOST

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
57NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
58Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
59Data Encryption Standard / Key size / Cryptographic protocols / Cryptographic software / Disk encryption / Index of cryptography articles / IPsec

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-10-15 13:48:57
60Housing in the United Kingdom / National House Building Council / Occupational safety and health / NEBOSH / Data Encryption Standard / Construction (Design and Management) Regulations

NHBC Safemark Competency Accreditation Service Appointment form and registration pack (including document checklist) This form appoints Santia Accreditation to carry out NHBC Safemark Competency Accreditation for your c

Add to Reading List

Source URL: www.nhbc.co.uk

Language: English - Date: 2016-07-01 06:57:26
UPDATE