<--- Back to Details
First PageDocument Content
CWC mode / OCB mode / Block cipher / Feistel cipher / Advantage / Cipher / Cryptographic hash function / Advanced Encryption Standard / EAX mode / Cryptography / Block cipher modes of operation / Authenticated encryption
Date: 2012-12-05 15:13:00
CWC mode
OCB mode
Block cipher
Feistel cipher
Advantage
Cipher
Cryptographic hash function
Advanced Encryption Standard
EAX mode
Cryptography
Block cipher modes of operation
Authenticated encryption

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 907,10 KB

Share Document on Facebook

Similar Documents

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

DocID: 1rEjw - View Document

Information science / Information retrieval / Hashing / Countmin sketch / Recommender system / MinHash / K-nearest neighbors algorithm / Feature hashing / Cryptographic hash function / Collaborative filtering

POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

DocID: 1roz3 - View Document

Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1rmtA - View Document

Information retrieval / Search algorithms / Information science / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Universal hashing / Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

DocID: 1rivo - View Document