<--- Back to Details
First PageDocument Content
OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes
Date: 2012-12-07 13:09:22
OCB mode
Block ciphers
IAPM
Authenticated encryption
Advanced Encryption Standard
Block cipher
UMAC
Mihir Bellare
EAX mode
Cryptography
Block cipher modes of operation
Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 191,64 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Microsoft PowerPoint - abuse of cryptography.ppt

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document