<--- Back to Details
First PageDocument Content
OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes
Date: 2012-12-07 13:09:22
OCB mode
Block ciphers
IAPM
Authenticated encryption
Advanced Encryption Standard
Block cipher
UMAC
Mihir Bellare
EAX mode
Cryptography
Block cipher modes of operation
Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 191,64 KB

Share Document on Facebook

Similar Documents

OCB mode / Meeting

GUIDELINES FOR OCB SCOPING WORKSHOPS In order to be as focused and effective as possible, scoping workshops should be limited to[removed]participants. Please devise a consistent and transparent system for determining who w

DocID: ZzK5 - View Document

OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

DocID: yGCN - View Document

Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

DocID: yfJY - View Document

Block cipher / IAPM / Authenticated encryption / Advanced Encryption Standard / Message authentication codes / Ciphertext stealing / AEAD block cipher modes of operation / Cryptography / Block cipher modes of operation / OCB mode

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: OCB Mode: Parallelizable Authenticated Encryption

DocID: yeLB - View Document

OCB mode / IAPM / Authenticated encryption / CBC-MAC / Block cipher / Initialization vector / Padding / Ciphertext stealing / Block size / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Second Modes of Operation Workshop (August 2001)

DocID: xAdx - View Document