EAX mode

Results: 25



#Item
1

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

Add to Reading List

Source URL: web.cs.ucdavis.edu

- Date: 2004-02-01 14:53:47
    2Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

    YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2015-04-13 14:47:47
    3Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

    AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2015-03-29 23:38:04
    4Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

    Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:12:18
    5Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

    yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2014-09-24 13:04:57
    6One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

    YubiHSM User Manual Version: 1.0.4 May 21, 2012

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2014-09-24 13:06:44
    7OCB mode / Block ciphers / IAPM / Authenticated encryption / Advanced Encryption Standard / Block cipher / UMAC / Mihir Bellare / EAX mode / Cryptography / Block cipher modes of operation / Message authentication codes

    Second Modes of Operation Workshop (August[removed]OCB Modes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-07 13:09:22
    8Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

    First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-07 12:39:19
    9Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

    First Modes of Operation Workshop (October[removed]CTR Mode Encryption

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-07 11:22:57
    10Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

    CCM Use Requirements Specification.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 14:56:29
    UPDATE