<--- Back to Details
First PageDocument Content
Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software
Date: 2015-05-21 10:19:50
Advanced Encryption Standard
AES instruction set
X86 architecture
FIPS 140-2
Cryptographic hash function
FIPS 140
Key Wrap
Crypto++
Pretty Good Privacy
Cryptography
Cryptography standards
Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 412,03 KB

Share Document on Facebook

Similar Documents

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

DocID: 1ttqA - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

DocID: 1pFqD - View Document