<--- Back to Details
First PageDocument Content
CWC mode / OCB mode / Block cipher / Feistel cipher / Advantage / Cipher / Cryptographic hash function / Advanced Encryption Standard / EAX mode / Cryptography / Block cipher modes of operation / Authenticated encryption
Date: 2012-12-05 15:13:00
CWC mode
OCB mode
Block cipher
Feistel cipher
Advantage
Cipher
Cryptographic hash function
Advanced Encryption Standard
EAX mode
Cryptography
Block cipher modes of operation
Authenticated encryption

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 907,10 KB

Share Document on Facebook

Similar Documents

OCB mode / Meeting

GUIDELINES FOR OCB SCOPING WORKSHOPS In order to be as focused and effective as possible, scoping workshops should be limited to[removed]participants. Please devise a consistent and transparent system for determining who w

DocID: ZzK5 - View Document

OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

Second Modes of Operation Workshop (August[removed]OCB Modes

DocID: yGCN - View Document

Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

DocID: yfJY - View Document

Block cipher / IAPM / Authenticated encryption / Advanced Encryption Standard / Message authentication codes / Ciphertext stealing / AEAD block cipher modes of operation / Cryptography / Block cipher modes of operation / OCB mode

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: OCB Mode: Parallelizable Authenticated Encryption

DocID: yeLB - View Document

OCB mode / IAPM / Authenticated encryption / CBC-MAC / Block cipher / Initialization vector / Padding / Ciphertext stealing / Block size / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Second Modes of Operation Workshop (August 2001)

DocID: xAdx - View Document