Key Wrap

Results: 102



#Item
1

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

Add to Reading List

Source URL: www.iacr.org

- Date: 2008-06-01 02:58:21
    2Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

    An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:23:28
    3Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

    Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-27 10:26:48
    4Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

    The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:22:52
    5Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

    : Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

    Add to Reading List

    Source URL: spar.isi.jhu.edu

    Language: English - Date: 2012-11-01 12:03:04
    6Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

    Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-29 15:19:10
    7Cryptographic software / Cryptography standards / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / Key Wrap / Camellia / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English - Date: 2016-04-08 19:51:32
    8

    The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:18:42
      9

      Valuing our clothes is a summary of the key findings of a major technical report published by WRAP. It presents estimates of the carbon, water and waste footprints of clothing throughout its life-cycle for one year for t

      Add to Reading List

      Source URL: www.textile-recycling.org.uk

      Language: English - Date: 2014-02-11 04:39:25
        10

        Mid-Term Workshop Wrap up Some key points •

        Add to Reading List

        Source URL: www.cabri-sbo.org

        - Date: 2014-09-05 05:32:17
          UPDATE