First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-05 15:12:18Ciphertext Symmetric-key algorithm Cipher EAX mode Disk encryption theory Cryptography Block cipher modes of operation Block cipher | Add to Reading List |
![]() | A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of OpeDocID: 1s3Vm - View Document |
![]() | YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubicoDocID: 17Z30 - View Document |
![]() | AUTHENTICATED ENCRYPTION Mihir Bellare UCSDDocID: 13aK2 - View Document |
![]() | Comments to NIST concerning AES Modes of Operations: CTR-Mode EncryptionDocID: Rn7V - View Document |
![]() | yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,DocID: MjcH - View Document |