<--- Back to Details
First PageDocument Content
Dm-crypt / Disk encryption theory / Linux Unified Key Setup / Block cipher modes of operation / TrueCrypt / PBKDF2 / Cryptoloop / Advanced Encryption Standard / Authenticated encryption / Cryptography / Disk encryption / Cryptographic software
Dm-crypt
Disk encryption theory
Linux Unified Key Setup
Block cipher modes of operation
TrueCrypt
PBKDF2
Cryptoloop
Advanced Encryption Standard
Authenticated encryption
Cryptography
Disk encryption
Cryptographic software

Add to Reading List

Source URL: clemens.endorphin.org

Download Document from Source Website

File Size: 1,04 MB

Share Document on Facebook

Similar Documents

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information 26 avril 2017

DocID: 1vmql - View Document

Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

DocID: 1uVDI - View Document

Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago Krovetz–Rogaway, tomorrow:

DocID: 1uzgg - View Document

Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

DocID: 1uv45 - View Document

Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

DocID: 1uqxV - View Document