Back to Results
First PageMeta Content
Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes


Report on the Symmetric Key Block Cipher Modes of Operation Workshop
Add to Reading List

Document Date: 2012-12-07 11:20:22


Open Document

File Size: 110,26 KB

Share Result on Facebook

Company

IBM / Sandia National Laboratories / CBC / VDG Inc. / the AES / /

Continent

Europe / /

Country

United States / /

/

Facility

University of Nevada / National Institute of Standards and Technology / Baltimore Convention Center / University of California at Davis / Royal Institute of Technology / /

IndustryTerm

fundamental algorithms / symmetric key block cipher algorithms / cipher algorithm / software implementations / encryption applications / Internet Key Exchange protocol / block cipher algorithm / real time applications / encryption algorithm / speed applications / /

NaturalFeature

Key stream / /

Organization

University of California / US government / European Central Bank / University of Nevada / National Institute of Standards and Technology / US Federal Reserve / Institute of Technology in Sweden / /

Person

Lars Knudsen / John HÃ¥stad / Phillip Rogaway / Bart Preneel / Elaine Barker / Vincent Rijmen / David Wagner / Helger Lipmaa / John Black / Virgil Gligor / Phil Rogaway / Tom Phinney / Richard Schroeppel / /

Position

author / Governor / Secretary of Commerce / forward / given the correct starting point / /

ProgrammingLanguage

ABC / /

ProvinceOrState

Nevada / California / /

Technology

underlying block cipher algorithm / hard-disk encryption / encryption algorithm / Block Cipher / block-oriented symmetric encryption / Stateful encryption / symmetric key block cipher algorithms / random access / cipher algorithm / Encryption / underlying cipher algorithm / architecture-dependent parallel encryption / 2.2 Encryption / message encryption / 2.4 CTR-Mode Encryption / block cipher algorithm / Internet Key Exchange protocol / /

URL

http /

SocialTag