<--- Back to Details
First PageDocument Content
Linear feedback shift register / Applied mathematics / Stream cipher / Block cipher modes of operation / Bit array / 3GPP / Algorithm / Cryptography / Mathematics / Binary arithmetic
Date: 2013-04-22 10:42:53
Linear feedback shift register
Applied mathematics
Stream cipher
Block cipher modes of operation
Bit array
3GPP
Algorithm
Cryptography
Mathematics
Binary arithmetic

Add to Reading List

Source URL: www.gsma.com

Download Document from Source Website

File Size: 286,46 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Cryptography / Block cipher modes of operation / Initialization vector / Ciphertext / Cipher / Symmetric-key algorithm

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document