Disk encryption theory

Results: 36



#Item
1New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

Add to Reading List

Source URL: tomb.dyne.org

- Date: 2011-01-28 17:33:02
    2Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Phillip Rogaway ∗

    Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Phillip Rogaway ∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2006-12-11 12:04:14
    3The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

    The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:22
    4: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

    : Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

    Add to Reading List

    Source URL: spar.isi.jhu.edu

    Language: English - Date: 2012-11-01 12:03:04
    5A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway†  June 17, 2003

    A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:29
    6The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

    The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2012-05-16 03:26:41
    7AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara   Ted Krovetz

    AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-10-15 15:27:48
    81  Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

    1 Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-11-23 20:00:54
    9J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

    J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    10Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

    Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:12:18