<--- Back to Details
First PageDocument Content
Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography
Date: 2011-04-20 04:03:50
Padding
Authenticated encryption
Chosen-ciphertext attack
Block cipher modes of operation
Block cipher
Ciphertext
Symmetric-key algorithm
Transport Layer Security
Message authentication code
Cryptography
Electronic commerce
Public-key cryptography

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 370,83 KB

Share Document on Facebook

Similar Documents

Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

How to Configure Identical Credentials Configuration Guide

DocID: 1rlsV - View Document

Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1qZv0 - View Document

Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document

Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

DocID: 1q44R - View Document