Block cipher modes of operation

Results: 320



#Item
81Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:12:18
82Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
83EK / Snuffle / Stream ciphers / Keystream / Block cipher modes of operation

  New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
84Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
85Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
86Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
87One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
88FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Critical Security Parameter / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 12:21:50
89FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Key Wrap / Critical Security Parameter / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 11:58:21
90Encryption software / Encryption / Cipher / Science / Computer security / Security / Block cipher modes of operation / Network Security & Cryptography / On-the-fly encryption / Cryptography / Cryptographic software / Disk encryption

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Aadarsh Jha

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:11:38
UPDATE