<--- Back to Details
First PageDocument Content
Block cipher / Ciphertext stealing / Data Encryption Standard / Cipher / Symmetric-key algorithm / Block size / IEEE P1619 / Intel Cascade Cipher / Cryptography / Advanced Encryption Standard / Block cipher modes of operation
Date: 2012-01-16 04:35:17
Block cipher
Ciphertext stealing
Data Encryption Standard
Cipher
Symmetric-key algorithm
Block size
IEEE P1619
Intel Cascade Cipher
Cryptography
Advanced Encryption Standard
Block cipher modes of operation

LNCS[removed]Memory Encryption for Smart Cards

Add to Reading List

Source URL: emsec.rub.de

Download Document from Source Website

File Size: 570,81 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

DocID: 1qezJ - View Document

Pseudorandom permutation / Advanced Encryption Standard / Ciphertext stealing / Data Encryption Standard / RSA / Advantage / Parity of a permutation / Block cipher / GOST

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

DocID: 1pgef - View Document

Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

DocID: 1oOtp - View Document

Cryptography / Block cipher modes of operation / Ciphertext stealing / Ciphertext / Symmetric-key algorithm / Initialization vector

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

DocID: 1jV4l - View Document