Back to Results
First PageMeta Content
Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation


GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]
Add to Reading List

Document Date: 2011-05-09 07:04:03


Open Document

File Size: 223,18 KB

Share Result on Facebook

City

Addison / /

Company

GMAC / the AES / /

Country

United States / /

/

Facility

National Institute of Standards and Technology / /

IndustryTerm

cryptographic protocols / authentication algorithms / cryptographic protocol / complicated cryptographic protocols / exponentiation algorithm / /

OperatingSystem

Linux / /

Organization

National Institute of Standards and Technology / /

Person

Sophie Germain / /

ProvinceOrState

Texas / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

encryption / block cipher / FPGA / Cryptography / 1.7 gHz AMD V140 processor / authentication algorithms / exponentiation algorithm / GHASH algorithm / Secure Shell Transport Layer Protocol / Linux / Silver-Pohlig-Hellman algorithm / complicated cryptographic protocols / /

URL

http /

SocialTag