Block cipher modes of operation

Results: 320



#Item
101FIPS 140 / Block cipher modes of operation / Initialization vector / Advanced Encryption Standard / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - JN 871 01b - Relm Security Policy Level 1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-06-23 01:00:00
102System software / Freedesktop.org / X Window System / Wireless LAN / Block cipher modes of operation / Wireless bridge / Software / Computing / Wireless networking

Microsoft Word - 3eTI Security Policy 3e-523-F2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
103FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
104FIPS 140 / Block cipher modes of operation / Initialization vector / Advanced Encryption Standard / Public-key cryptography / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word[removed]Relm Security Policy Level 1 - version 1.4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
105Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
106OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:09:22
107Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
108Block cipher / K1 / ISO/IEC 9797-1 / Daewoo Precision Industries K2 / CBC-MAC / CMAC / Message authentication codes / Cryptography / Triple DES

First Modes of Operation Workshop (October[removed]A Suggestion for Handling Arbitrary-Length Messages with the CBC MAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:17
109Block cipher modes of operation / Advanced Encryption Standard / CCM mode / Test / Validation / Block cipher / Transmission Control Protocol / Fax / Algorithm / Cryptography / Technology / Computing

The CCM Validation System (CCMVS) Updated: January 9, 2012 March 30, 2006 November 29, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-09 14:51:29
110Ciphertext stealing / Authenticated encryption / Padding / Cipher / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

Second Modes of Operation Workshop (August[removed]The XCBC-XOR, XECB-XOR and XECB-MAC Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:07:48
UPDATE