Disk encryption theory

Results: 36



#Item
11Security Analysis of TrueCrypt 7.0a with an Attack on the Keyfile Algorithm Ubuntu Privacy Remix Team <info@privacy-cd.org> August 14, 2011  Contents

Security Analysis of TrueCrypt 7.0a with an Attack on the Keyfile Algorithm Ubuntu Privacy Remix Team August 14, 2011 Contents

Add to Reading List

Source URL: www.privacy-cd.org

Language: English - Date: 2011-10-10 10:53:50
12First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:39:19
13First Modes of Operation Workshop (October[removed]Encryption Modes with Almost Free Message Integrity  jutla-auth.PDF

First Modes of Operation Workshop (October[removed]Encryption Modes with Almost Free Message Integrity jutla-auth.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:36:55
14jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:25:51
15MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani  Rupak Majumdar

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
16Special purpose file systems / Advanced Encryption Standard / Ciphertext / Block cipher / Filesystem-level encryption / Cipher / Padding / Block cipher modes of operation / Disk encryption theory / Cryptography / Disk encryption / Cryptographic software

HADOOP Cryptographic File System {yi.a.liu, tianyou.li, uma.gangumalla, andrew.k.purtell, avik.dey, niraj.rai}@intel.com, [removed] Mar 19, 2014 Contents

Add to Reading List

Source URL: issues.apache.org

Language: English
17Public Comments on the August, 2009 Draft of Special Publication 800-38E This document contains the public comments that NIST received on the August, 2009 draft of Special Publication 800-38E: Recommendation for Block Ci

Public Comments on the August, 2009 Draft of Special Publication 800-38E This document contains the public comments that NIST received on the August, 2009 draft of Special Publication 800-38E: Recommendation for Block Ci

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:29:38
18Matt, This is a very good summary of the advantages of XTS over the currently approved FIPS[removed]encryption modes. However, there are a few points, which can be made more accurate: - Parallel design: CBC mode is customa

Matt, This is a very good summary of the advantages of XTS over the currently approved FIPS[removed]encryption modes. However, there are a few points, which can be made more accurate: - Parallel design: CBC mode is customa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:21:18
19Email Comments on Block Cipher Modes of Operation

Email Comments on Block Cipher Modes of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:19:20
20Public Comments on the XTS-AES Mode

Public Comments on the XTS-AES Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:18:13