Authenticated encryption

Results: 182



#Item
131Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-01-10 14:24:21
132Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
133Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
134Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / Block cipher / Authenticated encryption / CMAC / Initialization vector / Message authentication codes / Cryptography / Block cipher modes of operation

Efficient authentication of large, dynamic data sets using Galois/Counter Mode (GCM) David McGrew Cisco Systems, Inc. 510 McCarthy Blvd.. Milpitas, CA 95035

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 15:26:12
135Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / IEEE P1619 / Ciphertext stealing / Cryptography / Block cipher modes of operation / Message authentication codes

The Galois/Counter Mode of Operation (GCM) David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 16:00:57
136Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
137Internet protocols / Data / Network architecture / Authenticated encryption / IPsec / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Hello NIST, We are currently implementing GCM in accordance with RFC 4106 which covers The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP). A requirement exists to be compliant with SP800-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:13:20
138Advanced Encryption Standard / Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / AES implementations / Ciphertext / CBC-MAC / IEEE P1619 / Cryptography / Block cipher modes of operation / Message authentication codes

High Speed Architecture for Galois/Counter Mode of Operation (GCM) Bo Yang, Sambit Mishra, Ramesh Karri ECE Department Polytechnic University, Brooklyn, NY Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 11:58:59
139Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
140Advanced Encryption Standard / Key Wrap / Block cipher / Authenticated encryption / Triple DES / Message authentication codes / CCM mode / Galois/Counter Mode / Cryptography / Data Encryption Standard / Block cipher modes of operation

SP[removed]Draft, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 13:08:58
UPDATE