1![Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2 Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2](https://www.pdfsearch.io/img/6361d8dca3f1ab7fac583abdaa6823df.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-12-30 23:23:40
|
---|
2![Proceedings - NN - RFIDSec08 Proceedings - NN - RFIDSec08](https://www.pdfsearch.io/img/c60d08a05322b89dccb5ea2d374229d7.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-17 01:40:17
|
---|
3![D:/Documents/Courses/Winter 2014/aez/rae.dvi D:/Documents/Courses/Winter 2014/aez/rae.dvi](https://www.pdfsearch.io/img/4d2df65df1b18c5076d22af367a8bf07.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-11-11 12:09:54
|
---|
4![On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge](https://www.pdfsearch.io/img/77e396a0755e4b026d956dea52fa4a0a.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2010-12-10 03:09:04
|
---|
5![A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA](https://www.pdfsearch.io/img/421d28920e0329cf65afae78078d0d82.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.eduLanguage: English - Date: 2001-10-24 10:54:04
|
---|
6![The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc](https://www.pdfsearch.io/img/6aa967fd83e5d79ba5401797724009bc.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:22
|
---|
7![On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M. CTCryptYaroslavl On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M. CTCryptYaroslavl](https://www.pdfsearch.io/img/ddb720df47231d48c08507df7be594b8.jpg) | Add to Reading ListSource URL: ctcrypt.ruLanguage: English - Date: 2016-06-10 06:36:02
|
---|
8![ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N](https://www.pdfsearch.io/img/ea93dffacbf38976d61d0d59fac84802.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2016-04-14 13:47:17
|
---|
9![Tortuga Password hashing based on the Turtle algorithm Teath Sch <>
Introduction Password hashing algorithms are a staple in any cryptographic Tortuga Password hashing based on the Turtle algorithm Teath Sch <>
Introduction Password hashing algorithms are a staple in any cryptographic](https://www.pdfsearch.io/img/47943881c81dd0a2ce158899723123fd.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-04-03 12:37:38
|
---|
10![FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun](https://www.pdfsearch.io/img/9973f209df3f5d97d1de59437e6c9105.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2012-05-16 03:47:37
|
---|