Back to Results
First PageMeta Content
OCB mode / IAPM / Authenticated encryption / CBC-MAC / Block cipher / Initialization vector / Padding / Ciphertext stealing / Block size / Cryptography / Block cipher modes of operation / Message authentication codes


Report on the Second Modes of Operation Workshop (August 2001)
Add to Reading List

Document Date: 2012-12-07 13:06:24


Open Document

File Size: 86,52 KB

Share Result on Facebook

City

Santa Barbara / Baltimore / Goleta / /

Company

IBM / ABC / VDG Inc. / the AES / /

Event

Patent Filing / /

Facility

University of Nevada / Operation Workshop The National Institute of Standards and Technology / Holiday Inn / University of California at Davis / /

IndustryTerm

software performance data / Internet Draft / exhaustive search / cryptographic applications / cryptographic hardware / block cipher algorithm / handshake protocol / potential additional security services / /

Organization

University of California / European Central Bank / DCSSI Crypto Lab / NIST’s Computer Security Division / University of Nevada / National Institute of Standards and Technology / /

Person

Lars Knudsen / Mats Näslund / Johann Håstad / Bill Burr / Phillip Rogaway / Aaron Nelson / Ahmed A. Belal / Vickie Harris / Morris Dworkin / Elaine Barker / Moez A. Abdel-Gawad / Teresa Vicente / John Black / /

Position

mathematician / author / underlying security model / /

ProgrammingLanguage

C / /

ProvinceOrState

Maryland / Nevada / California / /

Technology

IPSEC protocol / RAM / MAC algorithms / approved underlying block cipher algorithm / CBC encryption / block cipher / secret key / 3 processor / Encryption / RMAC algorithm / public key / DMAC algorithm / reduced strength encryption / extra block cipher encryption / XCBC algorithm / MAC algorithm / strength encryption / CBC-MAC algorithm / CBC MAC algorithm / handshake protocol / network protocols / /

URL

http /

SocialTag