DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Cryptography

Cryptography

  • A Quantitative Study of Advanced Encryption Standard Performance

    A Quantitative Study of Advanced Encryption Standard Performance

  • Constructing Low-Weight Dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform Claude Carlet and Xi Chen*

    Constructing Low-Weight Dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform Claude Carlet and Xi Chen*

  • Ohio IT Standard ITS-SEC-01 Data Encryption and Cryptography

    Ohio IT Standard ITS-SEC-01 Data Encryption and Cryptography

  • State of the Art in Lightweight Symmetric Cryptography

    State of the Art in Lightweight Symmetric Cryptography

  • Construction of Stream Ciphers from Block Ciphers and Their Security

    Construction of Stream Ciphers from Block Ciphers and Their Security

  • Chapter 2 the Data Encryption Standard (DES)

    Chapter 2 the Data Encryption Standard (DES)

  • Implementation of Advanced Encryption Standard Algorithm

    Implementation of Advanced Encryption Standard Algorithm

  • Implementation of Advanced Encryption Standard Algorithm With

    Implementation of Advanced Encryption Standard Algorithm With

  • Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

  • Security Evaluation of Cryptographic Technology Security Estimation Of

    Security Evaluation of Cryptographic Technology Security Estimation Of

  • Recommendation for Block Cipher Modes of Operation

    Recommendation for Block Cipher Modes of Operation

  • (Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme

    (Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES)

  • CRYPTREC Report 2001

    CRYPTREC Report 2001

  • Optimizing Authenticated Encryption Algorithms

    Optimizing Authenticated Encryption Algorithms

  • T-79.503 Cryptography and Data Security

    T-79.503 Cryptography and Data Security

  • Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College, Stottlerb@Etown.Edu

    Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College, [email protected]

  • Nist Sp 800-38D

    Nist Sp 800-38D

Top View
  • Bad Cryptography Bruce Barnett Who Am I?
  • FIPS 46-3, Data Encryption Standard
  • How to Evaluate the Security of Real-Life Cryptographic Protocols? the Cases of ISO/IEC 29128 and CRYPTREC
  • A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions
  • CSC 580 Cryptography and Computer Security
  • The Entropy Problem
  • Key Management Systems at the Cloud Scale
  • A Comparative Survey on Symmetric Key Encryption Algorithms
  • Japan CRYPTREC Activity on Lightweight Cryptography
  • Construction of Correlation Immune Boolean Functions*
  • Analysis of RC2
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
  • New Directions in Cryptography
  • Learning Correct Cryptography by Example — Seth James Nielson Christopher K
  • An Introduction to Cryptography Version Information an Introduction to Cryptography, Version 8.0
  • A Pros and Cons of Block Cipher Modes for Symmetric Key Algorithms
  • AVR2027: AES Security Module


© 2024 Docslib.org    Feedback