Back to Results
First PageMeta Content
Semantic security / Block cipher modes of operation / Key Wrap / Advantage / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Initialization vector / Authenticated encryption


Document Date: 2009-09-29 10:18:36


Open Document

File Size: 429,61 KB

Share Result on Facebook

City

Davis / ONVENTIONAL IV / /

Company

IBM / AES / CBC / Pr AG / probabilistic AE / Operation 11 7 Misuse-Resistant AE / /

Country

Thailand / United States / /

Currency

USD / /

Facility

Portland State University / D Building / Chiang Mai University / University of California at Davis / /

IndustryTerm

deterministic algorithms / Network security protocols / personal communications / immediate solution / decryption algorithms / forward and reverse algorithms / decryption algorithm / encryption algorithm / /

Organization

Faculty of Science / Chiang Mai University / University of California / Portland State University / Portland / Department of Computer Science / /

Product

S2V / Pseudorandom injection / /

ProvinceOrState

Oregon / California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / X9.102 algorithms / S/MIME / cryptography / RAM / IV-based authenticated-encryption / 1 DAE PRI MRAE SIV S2V PTE Deterministic authenticated-encryption / goal deterministic authenticated-encryption / encryption algorithm / Deterministic Authenticated-Encryption / Network security protocols / forward and reverse algorithms / misuse-resistant encryption / decryption algorithm / decryption algorithms / four algorithms / /

SocialTag