Block cipher mode of operation

Results: 110



#Item
31Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
32GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
33Special Publication on Authenticated Encryption

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
34Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:12:18
35Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
36yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
37YubiHSM User Manual Version: 1.0.4 May 21, 2012

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
38Second Modes of Operation Workshop (August[removed]OCB Modes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:09:22
39First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
40The CCM Validation System (CCMVS) Updated: January 9, 2012 March 30, 2006 November 29, 2004  Lawrence E. Bassham III

The CCM Validation System (CCMVS) Updated: January 9, 2012 March 30, 2006 November 29, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-09 14:51:29