Back to Results
First PageMeta Content
Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher


Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.
Add to Reading List

Document Date: 2011-07-09 03:55:17


Open Document

File Size: 199,79 KB

Share Result on Facebook

Company

the AES / Information Security Arjen K. Lenstra Citibank N.A. / /

Currency

USD / /

/

Facility

DES cracker / /

IndustryTerm

law less technology dependent / acceptable practical solution / parallel hardware device / exhaustive key search / equivalent alternative systems / cryptographic applications / cryptographic systems / cryptographic protocol / asymmetric systems / computational tool / symmetric systems / search engine / exhaustive key search attack / /

Organization

U.S. Department of Commerce / /

Position

author / Security Level General / /

Technology

encryption / block cipher / cryptography / private key / search engine / public key / underlying protocol / stream cipher / cryptographic protocol / /

SocialTag