Block cipher modes of operation

Results: 320



#Item
231Cryptography standards / IEEE P1619 / Advanced Encryption Standard / Standards organizations / Institute of Electrical and Electronics Engineers / Block cipher modes of operation / Disk encryption theory / Cryptography / Disk encryption / IEEE standards

Invitation to Public Comment on XTS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 08:18:38
232Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
233Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
234Ciphertext / Cipher / Block cipher / Ciphertext stealing / Cryptography / Block cipher modes of operation / Data Encryption Standard

NIST SP[removed], Modes of Operation Validation System [MOVS]: Requirements and Procedures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-30 14:32:33
235Block cipher modes of operation / Block cipher / Block size / Key size / Ciphertext / Cryptographic software / IEEE P1619 / Disk encryption theory / Cryptography / Advanced Encryption Standard / Disk encryption

The XTS-AES Validation System (XTSVS) Updated: September 5, 2013 Previously Updated: March 2, 2011 Original: March 31, 2010 Sharon S. Keller

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-04 14:11:58
236Advanced Encryption Standard / Block cipher / Ciphertext / Cipher / Ciphertext stealing / Substitution-permutation network / Cryptography / Block cipher modes of operation / Initialization vector

The Advanced Encryption Standard Algorithm Validation Suite (AESAVS) November 15, 2002 Lawrence E. Bassham III National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
237Advanced Encryption Standard / FIPS 140-2 / Block cipher modes of operation / Block cipher / IEEE P1619 / Key Wrap / IBM / Cryptography / Cryptography standards / Disk encryption

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-03 09:11:15
238Secure communication / Electronic commerce / Transport Layer Security / Padding / Block cipher modes of operation / GnuTLS / Cipher suite / RC4 / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Internet protocols

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-09 07:53:35
239Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
240Block cipher modes of operation / End-to-end encryption / ETSI Satellite Digital Radio / European Telecommunications Standards Institute / Technology / Cipher / Initialization vector / Public safety / Cyberwarfare / Cryptography / Trunked radio systems / Terrestrial Trunked Radio

EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-20 09:48:15
UPDATE