<--- Back to Details
First PageDocument Content
Key size / Key / Digital signature / Crypt / Symmetric-key algorithm / Book:Cryptography / Key Wrap / Cryptography / Key management / Public-key cryptography
Date: 2012-09-14 10:04:04
Key size
Key
Digital signature
Crypt
Symmetric-key algorithm
Book:Cryptography
Key Wrap
Cryptography
Key management
Public-key cryptography

Random Bit Generation (SP 800-90A, B and C)

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 440,55 KB

Share Document on Facebook

Similar Documents

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

DocID: 1ttqA - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

DocID: 1pFqD - View Document