<--- Back to Details
First PageDocument Content
Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1
Date: 2018-06-14 07:12:36
Cryptography
Block cipher modes of operation
Block cipher
Chosen-plaintext attack
Authenticated encryption
Cryptanalysis
Galois/Counter Mode
Chosen-ciphertext attack
Advanced Encryption Standard
OCB mode
Data Encryption Standard
Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 416,90 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Microsoft PowerPoint - abuse of cryptography.ppt

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document