Initialization vector

Results: 165



#Item
111Disk encryption / Hardware-based full disk encryption / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Initialization vector / Solid-state drive / Windows Vista / Trusted Computing Group / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-09 15:42:02
112Pseudorandom number generators / Applied mathematics / Entropy / Hardware random number generator / Random number generation / Pseudorandomness / Min-entropy / Initialization vector / RBG / Cryptography / Randomness / Information theory

NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:06:47
113Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
114Block cipher modes of operation / End-to-end encryption / ETSI Satellite Digital Radio / European Telecommunications Standards Institute / Technology / Cipher / Initialization vector / Public safety / Cyberwarfare / Cryptography / Trunked radio systems / Terrestrial Trunked Radio

EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-20 09:48:15
115Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
116Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
117Computer network security / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11

Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin Technische Universit¨ at Darmstadt, Fachbereich Informatik

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2007-04-03 09:43:48
118Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:16
119ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
120Trivium / ICE / Initialization vector / VEST / Weak key / Block cipher / Symmetric-key algorithm / Cryptography / Stream ciphers / Grain

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
UPDATE