Galois Counter Mode

Results: 62



#Item
1Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE)  My Job

Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE) My Job

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2017-05-31 03:05:40
    2LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

    LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2006-07-05 11:52:34
    3Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

    Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-02-04 15:25:58
    4International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    Add to Reading List

    Source URL: www.tmrfindia.org

    Language: English
    5Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

    Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2016-02-23 14:14:05
    6Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

    Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-08 11:48:52
    7A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1  2

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    8THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES PRIMITIVES AND SCHEMES FOR NON-ATOMIC INFORMATION AUTHENTICATION

    THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES PRIMITIVES AND SCHEMES FOR NON-ATOMIC INFORMATION AUTHENTICATION

    Add to Reading List

    Source URL: www.cs.fsu.edu

    Language: English - Date: 2012-09-05 15:29:15
    9

    PDF Document

    Add to Reading List

    Source URL: smaccmpilot.org

    Language: English - Date: 2014-03-04 18:04:46
    10Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

    Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2004-08-02 17:51:17