Galois Counter Mode

Results: 62



#Item
11Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
12Report Concerning Space Data System Standards  CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
13Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
14GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
15Special Publication on Authenticated Encryption

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
16Internet Engineering Task Force (IETF) Request for Comments: 6367 Category: Informational ISSN: [removed]S. Kanno

Internet Engineering Task Force (IETF) Request for Comments: 6367 Category: Informational ISSN: [removed]S. Kanno

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-09-07 17:41:39
17WHITE PAPER  AN EVALUATION OF NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING SELECTED CRYPTOGRAPHIC ALGORITHMS

WHITE PAPER AN EVALUATION OF NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING SELECTED CRYPTOGRAPHIC ALGORITHMS

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2011-10-28 14:45:02
18Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
19Key Management Interoperability Protocol

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
20Authentication Failures in NIST version of GCM

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44