Block cipher modes of operation

Results: 320



#Item
71Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
72Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
73Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-21 11:27:49
74International Journal of Engineering Research Volume No.3, Issue No.12, pp : [removed]ISSN:[removed]online),[removed]print) 01 Dec. 2014

International Journal of Engineering Research Volume No.3, Issue No.12, pp : [removed]ISSN:[removed]online),[removed]print) 01 Dec. 2014

Add to Reading List

Source URL: www.ijer.in

Language: English - Date: 2014-11-30 09:12:30
75Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo  May 13, 2011

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: blog.tempest.com.br

Language: English - Date: 2011-09-27 11:00:14
76Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
77J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
78Special Publication on Authenticated Encryption

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
79Accepted to JTAER at May 7, 2009  Read / Write Performance for low memory passive HF RFID tag-reader system Chih-Cheng Ou Yang1, B.S. Prabhu2, Charlie Qu3, Chi-Cheng Chu4, and Rajit Gadh5

Accepted to JTAER at May 7, 2009 Read / Write Performance for low memory passive HF RFID tag-reader system Chih-Cheng Ou Yang1, B.S. Prabhu2, Charlie Qu3, Chi-Cheng Chu4, and Rajit Gadh5

Add to Reading List

Source URL: www.wireless.ucla.edu

Language: English - Date: 2009-07-22 15:57:32
80DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31