Galois Counter Mode

Results: 62



#Item
11Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
12Committees / Consultative Committee for Space Data Systems / Cryptographic hash functions / Key size / Galois/Counter Mode / Advanced Encryption Standard / Block cipher / National Security Agency / SHA-1 / Cryptography / Message authentication codes / CCSDS

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
13Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
14Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
15Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
16Secure communication / Cryptography standards / Cryptographic software / Cipher suite / Transport Layer Security / Camellia / Galois/Counter Mode / CRYPTREC / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Internet Engineering Task Force (IETF) Request for Comments: 6367 Category: Informational ISSN: [removed]S. Kanno

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-09-07 17:41:39
17Cryptographic software / Advanced Encryption Standard / AES instruction set / Message authentication codes / Galois/Counter Mode / CLMUL instruction set / OpenSSL / Nehalem / Key generation / Cryptography / X86 architecture / X86 instructions

WHITE PAPER AN EVALUATION OF NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING SELECTED CRYPTOGRAPHIC ALGORITHMS

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2011-10-28 14:45:02
18Galois/Counter Mode / AES instruction set / Q / Coprocessor / NSA Suite B Cryptography / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
19Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
20Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
UPDATE