Block cipher

Results: 1020



#Item
461Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / Block size / IEEE P1619 / Cryptography / Block cipher modes of operation / Message authentication codes

The Galois/Counter Mode of Operation (GCM)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:23:54
462Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:54:44
463Initialization vector / Block cipher / Cryptogram / Padding / Fortuna / Entropy / Cryptography / Block cipher modes of operation / Pseudorandom number generators

Input Output Chaining (IOC) AE Mode Revisited January 2014 ­ Francisco Recacha1 ­ e-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-16 07:55:39
464Message authentication codes / Initialization vector / Block cipher / Block size / Authenticated encryption / Crypto++ / Index of cryptography articles / CBC-MAC / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

04snlntTLraelkFoldernt_Auth_EncTAES-Spec.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:11:01
465Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
466Cipher / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Block cipher

Propagating Cipher Feedback mode 1st revision By Henrick Hellström, StreamSec HB Copyright © 2001 StreamSec HB e-mail: [removed] home page: http://www.streamsec.com

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
467Padding / Authenticated encryption / Ciphertext stealing / CMAC / Cryptography / Block cipher modes of operation / Block cipher

NIST-addendum.dvi - ADDENDUM - XCBC Encryption with Authentication and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:05:13
468Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
469Checksum / Advantage / Block cipher / IAPM / RSA / Keystream / Cryptography / Stream ciphers / Block cipher modes of operation

Parallelizable Encryption Mode with Almost Free Message Integrity Charanjit S. Jutla IBM T. J. Watson Research Center, Yorktown Heights, NY[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:27:45
470Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:56:29
UPDATE