Authenticated encryption

Results: 182



#Item
121Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / Block size / IEEE P1619 / Cryptography / Block cipher modes of operation / Message authentication codes

The Galois/Counter Mode of Operation (GCM)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:23:54
122Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:54:44
123Message authentication codes / Initialization vector / Block cipher / Block size / Authenticated encryption / Crypto++ / Index of cryptography articles / CBC-MAC / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

04snlntTLraelkFoldernt_Auth_EncTAES-Spec.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:11:01
124Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
125Padding / Authenticated encryption / Ciphertext stealing / CMAC / Cryptography / Block cipher modes of operation / Block cipher

NIST-addendum.dvi - ADDENDUM - XCBC Encryption with Authentication and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:05:13
126Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
127Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
128Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
129Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
130One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:21
UPDATE