<--- Back to Details
First PageDocument Content
Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size
Date: 2010-12-02 09:59:21
Cryptography
Block cipher modes of operation
Symmetric-key cryptography
Disk encryption
Data Encryption Standard
Initialization vector
Symmetric-key algorithm
IEEE P1619
Block cipher
Ciphertext stealing
Authenticated encryption
Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Download Document from Source Website

File Size: 851,14 KB

Share Document on Facebook

Similar Documents

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on  European Multilaterally Secure Computing Base (EMSCB)

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

DocID: 1xTSa - View Document

New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

DocID: 1txHv - View Document

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge  Felix Gr¨obert ∗

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

DocID: 1sQhh - View Document

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

DocID: 1rfir - View Document

   Self-­‐Encrypting	
  Drive	
  Market	
  and	
  Technology	
  Report—Coughlin	
  Associates	
  	
   Self-Encrypting Drive Market and Technology

  Self-­‐Encrypting  Drive  Market  and  Technology  Report—Coughlin  Associates     Self-Encrypting Drive Market and Technology

DocID: 1raki - View Document