<--- Back to Details
First PageDocument Content
Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size
Date: 2010-12-02 09:59:21
Cryptography
Block cipher modes of operation
Symmetric-key cryptography
Disk encryption
Data Encryption Standard
Initialization vector
Symmetric-key algorithm
IEEE P1619
Block cipher
Ciphertext stealing
Authenticated encryption
Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Download Document from Source Website

File Size: 851,14 KB

Share Document on Facebook

Similar Documents

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Microsoft Word - eNovatech_ASUS FINAL_1.doc

Microsoft Word - eNovatech_ASUS FINAL_1.doc

DocID: 1p2pb - View Document

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption  Introduction

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

DocID: 1orwX - View Document

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

DocID: 1mZPd - View Document

1  Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

1 Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

DocID: 15ctX - View Document