<--- Back to Details
First PageDocument Content
Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption
Date: 2008-03-13 10:38:18
Block cipher modes of operation
Encryption
Advanced Encryption Standard
Initialization vector
Computer security
Public-key cryptography
Cryptography
Precomputation
Authenticated encryption

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Download Document from Source Website

File Size: 268,00 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

CMYK / .eps  Facebook “f ” Logo CMYK / .eps

CMYK / .eps Facebook “f ” Logo CMYK / .eps

DocID: 1qJdS - View Document

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

DocID: 1qBQm - View Document

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document