Author:
Ball Matthew V.,Guyot Cyril,Hughes James P.,Martin Luther,Noll Landon Curt
Subject
Applied Mathematics,Computer Science Applications
Reference10 articles.
1. Dworkin , M. May 2004 . NIST SP 800-38C. “Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality”.
2. Dworkin , M. December 2009 . NIST SP 800-38E, “Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices”.
3. IEEE Std 1619–2007 . April 18, 2008 .The XTS-AES Tweakable Block Cipher. Institute of Electrical and Electronics Engineers, Inc.
4. Liskov , M. and Minematsu , K. 2008 . Comments on XTS-AES. Available athttp://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/XTS/XTS_comments-Liskov_Minematsu.pdf(Accessed 6 January 2012) .
5. Tweakable Block Ciphers
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cold Boot Attack on Encrypted Containers for Forensic Investigations;KSII Transactions on Internet and Information Systems;2022-09-30
2. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing;Communications in Computer and Information Science;2022
3. Comprehensive Side-Channel Power Analysis of XTS-AES;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2019-12
4. IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks;Wireless Communications and Mobile Computing;2016-09-30
5. Efficient Update of Encrypted Files for Cloud Storage;2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC);2015-12