Block cipher

Results: 1020



#Item
51Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
52The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
53FIPSValidation Process*  FIPSSections and Security Levels Security Levels  Sections

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
54NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
55Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24
56Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
57Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory  Serpent is a 128-bit block cipher designed by Ross

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
58Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-10 11:24:57
59Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
60Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34