Authenticated encryption

Results: 182



#Item
151Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
152Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
153Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
154Finite fields / Advanced Encryption Standard / Galois/Counter Mode / Block cipher / Authenticated encryption / NSA Suite B Cryptography / Poly1305-AES / XTR / Transport Layer Security / Cryptography / Message authentication codes / Block cipher modes of operation

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
155Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, and Eric M. Smith R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA.

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
156Functions and mappings / Fourier analysis / Keccak / NIST hash function competition / Function / ICE / Block cipher / Advanced Encryption Standard / Convolution / Mathematics / Mathematical analysis / Cryptography

CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:27
157GOST / NIST hash function competition / Hashing / Keccak / Advanced Encryption Standard / OpenSSL / Block cipher / Data Encryption Standard / ARIA / Cryptography / GOST standards / Cryptographic hash functions

S TRI B OB : Authenticated Encryption from GOST R[removed]LPS Permutation (Extended Abstract) Markku-Juhani O. Saarinen ∗ Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-05-31 01:59:06
158Symmetric-key algorithm / Cipher / LORAN / Key / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: waas.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
159Deterministic encryption / RSA / Cipher / One-time pad / Encryption / Authenticated encryption / Ciphertext indistinguishability / Cramer–Shoup cryptosystem / Cryptography / Semantic security / Ciphertext stealing

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
160Cryptographic hash function / Authenticated encryption / RSA / Advanced Encryption Standard / Disk encryption theory / Cryptography / Block cipher / Entropy

Space-Efficient Block Storage Integrity Alina Oprea∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 21:17:41
UPDATE