Block cipher modes of operation

Results: 320



#Item
151Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:56:29
152Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
153Initialization vector / Block cipher / Padding / Fortuna / Entropy / Block size / Galois/Counter Mode / Cryptography / Block cipher modes of operation / Pseudorandom number generators

IOC AE Mode v1[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 08:11:04
154Internet protocols / Block cipher modes of operation / Botnet / Malware / RC4 / Transmission Control Protocol / Internet security / Password authentication protocol / Transport Layer Security / Cryptography / Computing / Computer network security

P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-04-16 08:32:23
155Encryption software / Encryption / Cipher / Science / Computer security / Security / Block cipher modes of operation / Network Security & Cryptography / On-the-fly encryption / Cryptography / Cryptographic software / Disk encryption

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Aadarsh Jha

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:11:38
156Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
157Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:07
158Linear feedback shift register / SNOW / Block cipher modes of operation / Serpent / Primitive polynomial / Q / Grain / Cryptography / Stream ciphers / SOSEMANUK

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
159One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:21
160Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-01-10 14:24:21
UPDATE