<--- Back to Details
First PageDocument Content
Cryptography / Keystream / Applied mathematics / Mathematics / Initialization vector / Block cipher modes of operation / Block cipher / Stream ciphers
Date: 2012-08-08 12:23:28
Cryptography
Keystream
Applied mathematics
Mathematics
Initialization vector
Block cipher modes of operation
Block cipher
Stream ciphers

Block Cipher Modes of Operation-CCM Mode for Authentication and Confidentiality

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 281,17 KB

Share Document on Facebook

Similar Documents

Influence of first two keystream bytes 2−7 Bias 1 Bias 3 Bias 5

Influence of first two keystream bytes 2−7 Bias 1 Bias 3 Bias 5

DocID: 1xV86 - View Document

Keystream distribution at byte

Keystream distribution at byte

DocID: 1xTZC - View Document

Probability of keystream value

Probability of keystream value

DocID: 1xTVG - View Document

Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

DocID: 1xTHJ - View Document

Biases in the RC4 keystream (128 bit uniform keys) Nadhem AlFardan and Dan Bernstein and Kenny Paterson and Bertram Poettering and Jacob Schuldt Royal Holloway, University of London University of Illinois at Chicago

Biases in the RC4 keystream (128 bit uniform keys) Nadhem AlFardan and Dan Bernstein and Kenny Paterson and Bertram Poettering and Jacob Schuldt Royal Holloway, University of London University of Illinois at Chicago

DocID: 1tSaM - View Document