Block cipher

Results: 1020



#Item
451Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
452Ciphertext stealing / Block cipher / Initialization vector / Block size / Applied mathematics / Ciphertext / Cipher / Padding / Secrecy / Cryptography / Block cipher modes of operation / Cyberwarfare

NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:25:13
453Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
454Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
455Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
456Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
457Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
458Ciphertext indistinguishability / Advantage / Block cipher / Ciphertext / Cyberwarfare / Applied mathematics / Secrecy / Cryptography / Block cipher modes of operation / Authenticated encryption

The Associated-Data Problem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:33:09
459Authenticated encryption / OCB mode / Cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:34:11
460Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:25:51
UPDATE