<--- Back to Details
First PageDocument Content
Initialization vector / Ciphertext / Stream cipher / Symmetric-key algorithm / Substitution cipher / Ciphertext stealing / Cipher / Padding / Block size / Cryptography / Block cipher modes of operation / Block cipher
Date: 2011-07-10 02:35:13
Initialization vector
Ciphertext
Stream cipher
Symmetric-key algorithm
Substitution cipher
Ciphertext stealing
Cipher
Padding
Block size
Cryptography
Block cipher modes of operation
Block cipher

Add to Reading List

Source URL: cacr.uwaterloo.ca

Download Document from Source Website

File Size: 480,34 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Cryptography / Block cipher modes of operation / Initialization vector / Ciphertext / Cipher / Symmetric-key algorithm

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document