Key size

Results: 607



#Item
551Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management

A “proof-reading” of some issues in cryptography Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2007-10-01 04:24:00
552Cryptographic hash function / Block cipher / Password / Crypt / Key size / Key / Cipher / SHA-1 / Padding / Cryptography / Symmetric-key algorithm / Advanced Encryption Standard

maXbox Starter 13 Start with Crypto Programming 1.1 Set a Cipher

Add to Reading List

Source URL: www.softwareschule.ch

Language: English - Date: 2012-01-20 05:07:53
553Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
554Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
555Block cipher / CBC-MAC / Advanced Encryption Standard / DEAL / Key size / CMAC / Cryptography / Message authentication codes / One-key MAC

Comparison of CBC MAC Variants and Comments on NIST’s Consultation Paper Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
556Cipher / Key size / Key / Encryption software / Symmetric-key algorithm / One-time pad / Brute-force attack / Export of cryptography in the United States / Encryption / Cryptography / Key management / Public-key cryptography

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
557Block size / Data Encryption Standard / RSA Secret-Key Challenge / Key size / ICE / Block cipher / RC6 / Cryptography / RC5 / Madryga

The RC5 Encryption Algorithm? Ronald L. Rivest MIT Laboratory for Computer Science

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 14:14:30
558Symmetric-key algorithm / Key size / Cipher / Block ciphers / Message authentication codes / Poly1305-AES / Differential cryptanalysis / Cryptography / Advanced Encryption Standard / Ciphertext

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Add to Reading List

Source URL: www2.cs.uni-paderborn.de

Language: English - Date: 2004-07-08 11:01:15
559Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
560Data deduplication / Data management / Steganographic file system / Crypt / Freenet / Backup / Public-key cryptography / Key size / Secure communication / Cryptography / Disk file systems / Data compression

Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2013-09-11 13:26:16
UPDATE