<--- Back to Details
First PageDocument Content
Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program
Date: 2016-07-29 15:19:10
Cryptography standards
Cryptographic hash functions
Cryptographic software
Hashing
Block cipher mode of operation
SHA-2
Advanced Encryption Standard
Hash-based message authentication code
FIPS 140-2
Key Wrap
SHA-1
Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 141,91 KB

Share Document on Facebook

Similar Documents

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

DocID: 1ttqA - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

DocID: 1pFqD - View Document