Ciphertext stealing

Results: 76



#Item
31Data / Information / Padding / CBC-MAC / Block size / Ciphertext stealing / Block cipher / Communications protocol / Cyberwarfare / Block cipher modes of operation / Cryptography / Message authentication codes

Second Modes of Operation Workshop (August[removed]Selected Comments and Issues

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:07:15
32Block cipher / Honda P series / Ciphertext stealing

First Modes of Operation Workshop (October[removed]Comparing Cryptographic Modes of Operation using Flow Diagrams

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:27:40
33Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

First Modes of Operation Workshop (October[removed]CTR Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:57
34Ciphertext stealing / Block cipher / Initialization vector / Block size / Applied mathematics / Ciphertext / Cipher / Padding / Secrecy / Cryptography / Block cipher modes of operation / Cyberwarfare

NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:25:13
35Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
36Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
37Authenticated encryption / OCB mode / Cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:34:11
38Cipher / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Block cipher

Propagating Cipher Feedback mode 1st revision By Henrick Hellström, StreamSec HB Copyright © 2001 StreamSec HB e-mail: [removed] home page: http://www.streamsec.com

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
39Padding / Authenticated encryption / Ciphertext stealing / CMAC / Cryptography / Block cipher modes of operation / Block cipher

NIST-addendum.dvi - ADDENDUM - XCBC Encryption with Authentication and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:05:13
40Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
UPDATE