<--- Back to Details
First PageDocument Content
Cryptographic hash function / Authenticated encryption / Block cipher / Advanced Encryption Standard / OCB mode / EAX mode / Galois/Counter Mode / Cryptography / Block cipher modes of operation / CWC mode
Date: 2004-01-15 20:25:25
Cryptographic hash function
Authenticated encryption
Block cipher
Advanced Encryption Standard
OCB mode
EAX mode
Galois/Counter Mode
Cryptography
Block cipher modes of operation
CWC mode

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 299,08 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Cryptography / Block cipher modes of operation / Initialization vector / Ciphertext / Cipher / Symmetric-key algorithm

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document