Narrow your search

Library

KU Leuven (1)

ULiège (1)

VDIC (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2004 (2)

Listing 1 - 2 of 2
Sort by

Book
Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
Authors: --- ---
Year: 2004 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity of computer data by combining the techniques of the Counter (CTR) mode and the Cipher Block Chaining-Message Authentication Code (CBC-MAC) algorithm.


Book
Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
Authors: --- ---
Year: 2004 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity of computer data by combining the techniques of the Counter (CTR) mode and the Cipher Block Chaining-Message Authentication Code (CBC-MAC) algorithm.

Listing 1 - 2 of 2
Sort by