Block cipher modes of operation

Results: 320



#Item
91FIPS 140-2 / Disk encryption / Block cipher modes of operation / Zeroisation / Magnetic tape data storage / StorageTek tape formats / Encryption / Cryptography / Advanced Encryption Standard / Storage Technology Corporation

1B - Oracle StorageTek T10000D FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-16 10:42:34
92Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
93Cryptographic software / TrueCrypt / Scramdisk / E4M / Disk encryption theory / Advanced Encryption Standard / PKCS11 / Crypt / Block cipher modes of operation / Cryptography / Software / Disk encryption

Security Analysis of TrueCrypt 7.0a with an Attack on the Keyfile Algorithm Ubuntu Privacy Remix Team August 14, 2011 Contents

Add to Reading List

Source URL: www.privacy-cd.org

Language: English - Date: 2011-10-10 10:53:50
94Block cipher modes of operation / Knowledge / Statistics / Scientific method / Error detection and correction / Forward error correction / Type I and type II errors

Autonomous Data Error Detection and Recovery in Streaming Applications

Add to Reading List

Source URL: www.dddas.org

Language: English - Date: 2013-06-06 08:31:28
95Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
96ID-based encryption / Block cipher modes of operation / RSA / Cramer–Shoup cryptosystem / Authenticated encryption / Cryptography / Public-key cryptography / Cipher

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
97Key Wrap / Block cipher

############################################################## Block Cipher Modes of Operation Methods for Key Wrapping

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-05 08:32:35
98Block cipher

NIST SP 800-38F: Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping Examples

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-30 14:38:14
    99Advanced Encryption Standard / Zeroisation / Critical Security Parameter / FIPS 140 / Cryptographic hash function / Cryptographic Module Validation Program / Block cipher modes of operation / Crypto++ / Cryptography / Cryptography standards / FIPS 140-2

    Microsoft Word - 8a - Security Policy ver1.5.6_1.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-01-25 12:16:30
    100FIPS 140-2 / FIPS 140 / Data Encryption Standard / Zeroisation / Block cipher modes of operation / Initialization vector / Communications security / Cryptography / Cryptography standards / Advanced Encryption Standard

    Microsoft Word - 03g - KVL_4000_PIKE_Security_Policy_Level_3_IGL changes_Motorola addts.MOT_Accepted.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2010-12-21 00:00:00
    UPDATE