Block cipher modes of operation

Results: 320



#Item
11Cryptographic protocols / Data / Wireless networking / Computer network security / Advanced Encryption Standard / ZigBee / IPsec / Block cipher modes of operation / IEEE 802.15.4 / Cryptography / Computing / IEEE 802

Security Considerations for IEEENetworks Naveen Sastry David Wagner University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:45
12Block cipher modes of operation / Mode

New WITE32 Immediate Start Mode For Shorter Test Time • Typical Test Time Improvement 20–30% • Supported by Latest Revisions of RWA-2000 Series 1 The new mode of Guzik Test System operation allows for performing te

Add to Reading List

Source URL: www.guzik.com

Language: English - Date: 2007-09-18 00:49:34
13

1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:16
    14Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

    Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2002-12-02 19:59:21
    15Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

    Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-05-23 10:19:24
    16Feistel cipher / Ciphertext / Stream cipher / Cipher / Advantage / Keystream / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher modes of operation / Block cipher

    Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-04-22 13:24:19
    17Block cipher modes of operation / Block cipher / Ciphertext / RSA / PKCS / Triple DES / Tiny Encryption Algorithm / Cryptography / Public-key cryptography / Padding

    Strengthened Encryption in the CBC Mode Vlastimil Klíma 1 and Tomáš Rosa 1,2 1 ICZ, V Olšinách 75, Prague 10, Czech Republic, http://www.i.cz Department of Computer Science and Engineering, Faculty of Electri

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2002-08-28 08:36:04
    18Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

    Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-05-12 08:40:12
    19One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

    CS 161 Computer Security Spring 2010

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2010-03-08 01:45:53
    20Electronic engineering / Cryptography / Television / Television technology / DVB-CPCM / Digital Video Broadcasting / Block cipher modes of operation / DVB-C / Initialization vector / DVB / Broadcast engineering / MPEG

    TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

    Add to Reading List

    Source URL: www.etsi.org

    Language: English - Date: 2011-02-18 09:44:13
    UPDATE