First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-05 14:56:29Cryptographic protocols Block cipher Cryptographic nonce CBC-MAC Cipher Internet protocols Galois/Counter Mode EAX mode Block cipher modes of operation Cryptography Message authentication codes | Add to Reading List |
![]() | A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of OpeDocID: 1s3Vm - View Document |
![]() | YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubicoDocID: 17Z30 - View Document |
![]() | AUTHENTICATED ENCRYPTION Mihir Bellare UCSDDocID: 13aK2 - View Document |
![]() | Comments to NIST concerning AES Modes of Operations: CTR-Mode EncryptionDocID: Rn7V - View Document |
![]() | yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,DocID: MjcH - View Document |