<--- Back to Details
First PageDocument Content
Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher
Date: 2012-12-05 15:12:18
Ciphertext
Symmetric-key algorithm
Cipher
EAX mode
Disk encryption theory
Cryptography
Block cipher modes of operation
Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 110,98 KB

Share Document on Facebook

Similar Documents

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

DocID: 1s3Vm - View Document

Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

DocID: 17Z30 - View Document

Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

DocID: 13aK2 - View Document

Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

DocID: Rn7V - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document