<--- Back to Details
First PageDocument Content
Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2010-04-29 10:56:53
Block cipher modes of operation
Finite fields
Message authentication codes
Cryptographic Message Syntax
Key Management Interoperability Protocol
Key management
PKCS
Internet security
Galois/Counter Mode
Cryptography
Cryptographic protocols
Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Download Document from Source Website

File Size: 387,15 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Cryptography / Block cipher modes of operation / Initialization vector / Ciphertext / Cipher / Symmetric-key algorithm

Microsoft PowerPoint - abuse of cryptography.ppt

DocID: 1q6po - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document