<--- Back to Details
First PageDocument Content
Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes
Date: 2013-08-27 07:30:01
Broadband
Digital Enhanced Cordless Telecommunications
Software-defined radio
DECT Standard Cipher
Authenticated encryption
Block cipher
Initialization vector
Cipher
European Telecommunications Standards Institute
Cryptography
Block cipher modes of operation
Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Download Document from Source Website

File Size: 782,23 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Microsoft PowerPoint - abuse of cryptography.ppt

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document