<--- Back to Details
First PageDocument Content
Authenticated encryption / VEST / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes
Date: 2012-12-05 13:56:50
Authenticated encryption
VEST
EAX mode
Cryptography
Block cipher modes of operation
Message authentication codes

IWATA comments on EAXprime (EAX’)

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 26,67 KB

Share Document on Facebook

Similar Documents

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

DocID: 1s3Vm - View Document

Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

DocID: 17Z30 - View Document

Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

DocID: 13aK2 - View Document

Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

DocID: Rn7V - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document