<--- Back to Details
First PageDocument Content
CCM mode / Authenticated encryption / Block cipher / CBC-MAC / Symmetric-key algorithm / Data Encryption Standard / Feistel cipher / Block size / Galois/Counter Mode / Cryptography / Block cipher modes of operation / Message authentication codes
Date: 2012-02-02 09:54:42
CCM mode
Authenticated encryption
Block cipher
CBC-MAC
Symmetric-key algorithm
Data Encryption Standard
Feistel cipher
Block size
Galois/Counter Mode
Cryptography
Block cipher modes of operation
Message authentication codes

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 208,75 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

DocID: 1ntwC - View Document

PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

DocID: 18xOM - View Document

Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

DocID: Sgw6 - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document