First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-05 15:13:00CWC mode OCB mode Block cipher Feistel cipher Advantage Cipher Cryptographic hash function Advanced Encryption Standard EAX mode Cryptography Block cipher modes of operation Authenticated encryption | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 907,10 KBShare Document on Facebook |
![]() | GUIDELINES FOR OCB SCOPING WORKSHOPS In order to be as focused and effective as possible, scoping workshops should be limited to[removed]participants. Please devise a consistent and transparent system for determining who wDocID: ZzK5 - View Document |
![]() | Second Modes of Operation Workshop (August[removed]OCB ModesDocID: yGCN - View Document |
![]() | Report on the Symmetric Key Block Cipher Modes of Operation WorkshopDocID: yfJY - View Document |
![]() | First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: OCB Mode: Parallelizable Authenticated EncryptionDocID: yeLB - View Document |
![]() | Report on the Second Modes of Operation Workshop (August 2001)DocID: xAdx - View Document |