<--- Back to Details
First PageDocument Content
Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes
Date: 2012-12-05 14:56:29
Cryptographic protocols
Block cipher
Cryptographic nonce
CBC-MAC
Cipher
Internet protocols
Galois/Counter Mode
EAX mode
Block cipher modes of operation
Cryptography
Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 11,58 KB

Share Document on Facebook

Similar Documents

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

DocID: 1s3Vm - View Document

Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

DocID: 17Z30 - View Document

Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

DocID: 13aK2 - View Document

Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

DocID: Rn7V - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document