<--- Back to Details
First PageDocument Content
Public-key cryptography / Authenticated encryption / CMAC / Ciphertext indistinguishability / RSA / CBC-MAC / EAX mode / Cryptography / Message authentication codes / Block cipher modes of operation
Date: 2013-04-24 22:37:11
Public-key cryptography
Authenticated encryption
CMAC
Ciphertext indistinguishability
RSA
CBC-MAC
EAX mode
Cryptography
Message authentication codes
Block cipher modes of operation

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 267,66 KB

Share Document on Facebook

Similar Documents

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

DocID: 1s3Vm - View Document

Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

DocID: 17Z30 - View Document

Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

DocID: 13aK2 - View Document

Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

DocID: Rn7V - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document