Top View
- 4312 NTT Software Corporation Category: Standards Track S. Moriai Sony Computer Entertainment Inc
- A Comparative Survey on Symmetric Key Encryption Algorithms
- Crypto Agility (PDF)
- Analysis of RC2
- PFLASH - Secure Asymmetric Signatures on Smart Cards
- Cryptographic Tools, Key Distribution and Management
- Selecting Cryptographic Key Sizes Extended Abstract
- Report on the Development of the Advanced Encryption Standard (AES)
- Symmetric Key Cryptography
- Crypto Agility
- An Overview of Cryptography (Updated Version, 3 March 2016)
- History of Cryptography
- The Race to Crypto-Agility
- Data Encryption Standard (DES) and Simplified DES (SDES)
- Key-Dependent S-Box Manipulations
- • Introduction to DES • Overview of the DES Algorithm • Internal Structure of DES • Decryption • Security of DES Classification of DES in the Field of Cryptology
- Guidelines on Cryptographic Algorithms Usage and Key Management
- On the Design and Security of RC2
- Length of Cryptographic Keys
- Intel(R) Advanced Encryption Standard (AES) New Instructions
- Evaluating Elliptic Curve Based Kems in the Light of Pairings
- Comparison of Public Key Cryptography in Different Security
- Algorithms, Key Size and Parameters Report – 2014
- Cryptographic Technology Guideline (Lightweight Cryptography)
- A Simplified AES Algorithm
- Cryptography: History and Simple Encryption Methods and Preliminaries
- A Comparative Study of Rivest Cipher Algorithms
- Report on Lightweight Cryptography
- Lightweight Cryptography Methods
- Understanding Encryption
- RC2 Encryption and Decryption in Microsoft .NET
- Security of the AES with a Secret S-Box
- AES Key Agility Issues in High-Speed Ipsec Implementations
- Symmetric Algorithm Survey: a Comparative Analysis
- Cryptography – Origin
- FIPS 197, Advanced Encryption Standard (AES)
- Lecture 4 Data Encryption Standard (DES)
- Public Key Cryptography - Applications Algorithms and Mathematical Explanations
- Data Encryption Standard, As Specified in FIPS Publication 46- = = + 3 [31], Is a Block Cipher Operating on 64-Bit Data L2 R1 R2 L1 F(R1, K2) Blocks
- ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
- Identifying Research Challenges in Post Quantum Cryptography
- Advanced Encryption Standard (AES) and It’S Working
- Chapter 7 Advanced Encryption Standard (AES)
- Public-Key Cryptography and the RSA Algorithm Lecture Notes On
- CRYPTREC Report 2000 (Provisional Translation)
- Quantum Safe Cryptography and Security an Introduction, Benefits, Enablers and Challenges
- Nessie: a Decoupled, Client-Driven Key-Value Store Using RDMA
- Recommendation for Key Management, Part 3: Application
- Advanced Encryption Standard
- RSA and ECC: a Comparative Analysis
- An Overview of Cryptanalysis of RSA Public Key System
- Secret Key Cryptography
- The Effect of RSA Exponential Key Growth on the Multi- Core Computational Resource
- Advanced Encryption Standard
- Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
- A Cryptosystem Has (At Least) Five Ingredients
- Lecture 8: AES: the Advanced Encryption Standard
- Public-Key Cryptography Standards: PKCS
- History of Cryptographic Key Sizes?