<--- Back to Details
First PageDocument Content
Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security
Date: 2015-06-15 16:32:20
Cryptographic protocols
Computer security
Internet standards
Secure communication
Transport Layer Security
Jericho Forum
De-perimeterisation
Advanced Encryption Standard
Public-key cryptography
Cryptography
Data security
Security

Microsoft Word - Contents Thesis 1.10.doc

Add to Reading List

Source URL: www.few.vu.nl

Download Document from Source Website

File Size: 1,55 MB

Share Document on Facebook

Similar Documents

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1unET - View Document

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1ulfR - View Document

Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document

Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

DocID: 1rlUX - View Document

Advanced Encryption Standard / MD2 / Finite fields / Rijndael S-box / TI MSP430

Microsoft PowerPoint - HPTS_2009.ppt

DocID: 1qX2H - View Document