Galois Counter Mode

Results: 62



#Item
1

Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE) My Job

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2017-05-31 03:05:40
    2Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

    LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2006-07-05 11:52:34
    3Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / Internet security / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptography / Galois/Counter Mode / TLS-SRP

    Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-02-04 15:25:58
    4Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

    International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    Add to Reading List

    Source URL: www.tmrfindia.org

    Language: English
    5Reconfigurable computing / Fabless semiconductor companies / Field-programmable gate array / Disk encryption / Xilinx / Altera / Virtex / Bitstream / Data Encryption Standard / Galois/Counter Mode / Encryption / BitLocker

    Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2016-02-23 14:14:05
    6Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

    Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-08 11:48:52
    7Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    8Access control / Authentication / Notary / Packaging / Cryptographic protocols / Galois/Counter Mode / Cryptography / Security / Message authentication codes

    THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES PRIMITIVES AND SCHEMES FOR NON-ATOMIC INFORMATION AUTHENTICATION

    Add to Reading List

    Source URL: www.cs.fsu.edu

    Language: English - Date: 2012-09-05 15:29:15
    9Internet protocols / Secure communication / IPsec / Initialization vector / Unmanned aerial vehicle / Advanced Encryption Standard / CCMP / Padding / Galois/Counter Mode / Cryptography / Cryptographic protocols / Block cipher modes of operation

    PDF Document

    Add to Reading List

    Source URL: smaccmpilot.org

    Language: English - Date: 2014-03-04 18:04:46
    10Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

    Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2004-08-02 17:51:17
    UPDATE