Block cipher modes of operation

Results: 320



#Item
131Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
132Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
133Galois/Counter Mode / AES instruction set / Q / Coprocessor / NSA Suite B Cryptography / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
134Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
135Ciphertext stealing / Block cipher / Initialization vector / Block size / Applied mathematics / Ciphertext / Cipher / Padding / Secrecy / Cryptography / Block cipher modes of operation / Cyberwarfare

NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:25:13
136Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
137Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
138Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
139Ciphertext indistinguishability / Advantage / Block cipher / Ciphertext / Cyberwarfare / Applied mathematics / Secrecy / Cryptography / Block cipher modes of operation / Authenticated encryption

The Associated-Data Problem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:33:09
140Authenticated encryption / OCB mode / Cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:34:11
UPDATE