Block ciphers

Results: 398



#Item
61New Birthday Attacks on Some MACs Based on Block Ciphers  New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and

New Birthday Attacks on Some MACs Based on Block Ciphers New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-08-17 00:42:08
    62A SYMMETRIC KEY ENCRYPTION ALGORITHM  MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

    A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

    Add to Reading List

    Source URL: www.cryptrec.go.jp

    Language: English - Date: 2012-06-28 04:48:45
    63Christian Grothoff  COMP 3704 Computer Security Christian Grothoff

    Christian Grothoff COMP 3704 Computer Security Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2011-06-21 07:45:42
    64Security I – exercises Markus Kuhn Easter 2015 – CST Part IB  1

    Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-05-23 10:19:24
    65Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

    Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

    Add to Reading List

    Source URL: www.cryptrec.go.jp

    Language: English - Date: 2012-06-28 04:48:44
    66Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

    Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-05-12 08:40:12
    67Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2007-02-27 09:35:26
    68Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

    Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

    Add to Reading List

    Source URL: www.acsac.org

    Language: English - Date: 2011-11-01 01:01:06
    69CHAPTER  5 Cryptography ZHQM ZMGM ZMFM

    CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:23:43
    70Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

    Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

    Add to Reading List

    Source URL: www.philzimmermann.com

    Language: English - Date: 2003-06-01 01:29:48