Block cipher modes of operation

Results: 320



#Item
181Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:26:12
182Advanced Encryption Standard / E2 / Substitution cipher / Substitution-permutation network / Cryptography / Cipher / Block cipher

############################################################## Block Cipher Modes of Operation Electronic Codebook (ECB) Plaintext is 6BC1BEE2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:27:56
183Block cipher modes of operation / CMAC / Block cipher / CBC-MAC / Residual block termination / Cryptography / Message authentication codes / Finite fields

############################################################## Block Cipher Modes of Operation CMAC Mode for Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:25:32
184Block cipher modes of operation / Linear feedback shift register / Block cipher / Keystream / Differential cryptanalysis / Cipher / KFB mode / Index of cryptography articles / Cryptography / Stream ciphers / Pseudorandom number generators

Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2000-10-19 13:37:14
185Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
186Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / Block cipher / Authenticated encryption / CMAC / Initialization vector / Message authentication codes / Cryptography / Block cipher modes of operation

Efficient authentication of large, dynamic data sets using Galois/Counter Mode (GCM) David McGrew Cisco Systems, Inc. 510 McCarthy Blvd.. Milpitas, CA 95035

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 15:26:12
187Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / IEEE P1619 / Ciphertext stealing / Cryptography / Block cipher modes of operation / Message authentication codes

The Galois/Counter Mode of Operation (GCM) David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 16:00:57
188MULTI-S01 / CRYPTREC / Block cipher modes of operation / Symmetric-key algorithm / Cryptographic hash function / Cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Stream ciphers / Finite fields

Report on Present State of MULTI-S01 Cipher Evaluation (full evaluation) January 28, 2002 Takeshi Shimoyama,Yukiyasu Tsunoo, Kiyomichi Araki, Members

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
189Special purpose file systems / Advanced Encryption Standard / Ciphertext / Block cipher / Filesystem-level encryption / Cipher / Padding / Block cipher modes of operation / Disk encryption theory / Cryptography / Disk encryption / Cryptographic software

HADOOP Cryptographic File System {yi.a.liu, tianyou.li, uma.gangumalla, andrew.k.purtell, avik.dey, niraj.rai}@intel.com, [removed] Mar 19, 2014 Contents

Add to Reading List

Source URL: issues.apache.org

Language: English
190Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
UPDATE