Disk encryption theory

Results: 36



#Item
1

New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

Add to Reading List

Source URL: tomb.dyne.org

- Date: 2011-01-28 17:33:02
    2Special functions / Disk encryption theory / XEX / Rectangular function

    Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Phillip Rogaway ∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2006-12-11 12:04:14
    3Cryptography / Disk encryption theory / Block cipher / Feistel cipher / Malleability / Advantage / Ciphertext indistinguishability

    The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:22
    4Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

    : Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

    Add to Reading List

    Source URL: spar.isi.jhu.edu

    Language: English - Date: 2012-11-01 12:03:04
    5Disk encryption theory / Cryptography / Block cipher / Advantage / Stream ciphers / Cipher / Vigenre cipher / Format-preserving encryption

    A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:29
    6Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

    The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2012-05-16 03:26:41
    7Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

    AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-10-15 15:27:48
    8Cryptographic hash function / Advanced Encryption Standard / Disk encryption theory / IEEE P1619 / Cryptography / Block cipher / Cipher

    1 Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-11-23 20:00:54
    9Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

    J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    10Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

    Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:12:18
    UPDATE