Homepage Cyberwar Cybersecurity Cyberspace C-Spionage C-Sabotage Gefährdung Kriminalität Computer Kommunikation mod. Systeme Der Mensch Beratung Bildung Fachberichte Information Kryptologie Emission Verschlüsselung Forschung Begriffe Recht Technik Verschiedenes
Verfahren Kryptologisches Archiv Fertigkeiten Einführung in die Krypto-Analyse Krypto-Analyse II Einzelbeiträge Krypto-Analyse nach Friedman Studienmaterial
Einführung in die Blockchiffrier Mode sowie Methoden und Techniken
Recommendation for Block
Cipher Modes of Operation
Methods and Techniques

 
Recommendation for Block
Cipher Modes of Operation:
The CMAC Mode for
Authentication

Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality

Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

 
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices

 
Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

Recommendation for Block
Cipher Modes of Operation:
Three Variants of Ciphertext
Stealing for CBC Mode


deutsch english francais русский
encryption methods

after publication of the NIST / USA