Key Wrap

Results: 102



#Item
1A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

Add to Reading List

Source URL: www.iacr.org

- Date: 2008-06-01 02:58:21
    2An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:23:28
    3Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-27 10:26:48
    4The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

    The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:22:52
    5: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

    : Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

    Add to Reading List

    Source URL: spar.isi.jhu.edu

    Language: English - Date: 2012-11-01 12:03:04
    6Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

    Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-29 15:19:10
    7Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English - Date: 2016-04-08 19:51:32
    8The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

    The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:18:42
      9Valuing our clothes is a summary of the key findings of a major technical report published by WRAP. It presents estimates of the carbon, water and waste footprints of clothing throughout its life-cycle for one year for t

      Valuing our clothes is a summary of the key findings of a major technical report published by WRAP. It presents estimates of the carbon, water and waste footprints of clothing throughout its life-cycle for one year for t

      Add to Reading List

      Source URL: www.textile-recycling.org.uk

      Language: English - Date: 2014-02-11 04:39:25
        10Mid-Term Workshop Wrap up Some key points  •

        Mid-Term Workshop Wrap up Some key points •

        Add to Reading List

        Source URL: www.cabri-sbo.org

        - Date: 2014-09-05 05:32:17