Search results
Jump to navigation
Jump to search
Page title matches
- ...Cipher Modes of Operation" <ref>{{cite paper | title = Recommendation for Block Cipher Modes of Operation | publisher = National Institute for Standards & Technology | date = 2001 |8 KB (1,301 words) - 17:00, 19 July 2024
- 315 bytes (44 words) - 03:34, 23 May 2009
- | pagename = Block cipher modes of operation | abc = Block cipher modes of operation990 bytes (103 words) - 22:58, 1 March 2010
- 115 bytes (15 words) - 03:31, 23 May 2009
- Auto-populated based on [[Special:WhatLinksHere/Block cipher modes of operation]]. Needs checking by a human.722 bytes (93 words) - 17:00, 19 July 2024
Page text matches
- | pagename = Block cipher modes of operation | abc = Block cipher modes of operation990 bytes (103 words) - 22:58, 1 March 2010
- {{r|Block cipher modes of operation}}736 bytes (94 words) - 17:00, 19 July 2024
- {{r|Block cipher modes of operation}}587 bytes (76 words) - 20:45, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Block cipher modes of operation]]. Needs checking by a human.722 bytes (93 words) - 17:00, 19 July 2024
- {{r|Block cipher modes of operation}}815 bytes (104 words) - 12:00, 30 August 2024
- {{r|Block cipher modes of operation}}770 bytes (98 words) - 07:00, 26 August 2024
- ...put a block of ciphertext of the same size. Block ciphers are used in a [[Block cipher modes of operation|mode of operation]] to implement a cryptosystem.4 KB (546 words) - 05:48, 8 April 2024
- ...Cipher Modes of Operation" <ref>{{cite paper | title = Recommendation for Block Cipher Modes of Operation | publisher = National Institute for Standards & Technology | date = 2001 |8 KB (1,301 words) - 17:00, 19 July 2024
- Code book attacks can be used against any block cipher [[Block cipher modes of operation | mode of operation]].6 KB (1,068 words) - 07:01, 30 July 2024
- There are other RFCs covering [[block cipher modes of operation]] and how these ciphers should be used in protocols such as [[IPsec]], [[Op4 KB (600 words) - 23:49, 7 June 2012
- : [[Block cipher modes of operation]] is started but incomplete. Could you improve that? [[User:Sandy Harris|Sa2 KB (334 words) - 15:57, 26 January 2010
- A block cipher defines how a single block is encrypted; a [[block cipher modes of operation| mode of operation]] defines how multiple block encryptions are combined to ...encrypt objects larger than their block size; just choose an appropriate [[Block cipher modes of operation|mode of operation]].53 KB (8,375 words) - 17:00, 19 July 2024
- Any [[block cipher]] can be used to construct a stream cipher; there are [[block cipher modes of operation]] designed for this. Either [[Block_cipher_modes_of_operation#Output_Feedb24 KB (3,851 words) - 05:49, 8 April 2024
- A [[block cipher]] can provide a good pseudo-random sequence; the [[Block cipher modes of operation|modes of operation]] for this are [[Block_cipher_modes_of_operation#Output_23 KB (3,615 words) - 15:04, 19 August 2024
- ...enough. The block cipher itself defines how a single block is encrypted; [[Block cipher modes of operation | modes of operation]] specify how these operations are combined to achieve28 KB (4,396 words) - 08:36, 22 June 2024
- ...y Payload (ESP). ESP encryption this is done using a [[block cipher]] in [[Block cipher modes of operation | CBC mode]]. In the most used setup, keys are automatically negotiated, an Encryption is done with a [[block cipher]] using [[Block cipher modes of operation | CBC mode]]. The RFCs require support for only two mandatory encryption al40 KB (6,220 words) - 11:51, 2 September 2024
- :: Did that, using [[Block cipher modes of operation]] which makes sense and is what Wikipedia uses. [[User:Sandy Harris|Sandy H ...veral things have already been moved out of here into separate articles. [[Block cipher modes of operation]], [[code book attack]], [[algebraic attack]]. Is that what you mean by "su58 KB (9,554 words) - 14:37, 18 March 2024
- ...enough. The block cipher itself defines how a single block is encrypted; [[Block cipher modes of operation | modes of operation]] specify how these operations are combined to achieve ...er. In particular, any block cipher can be used as stream cipher in some [[Block cipher modes of operation | modes of operation]]. In general, stream ciphers are faster than block ci52 KB (8,336 words) - 12:00, 3 August 2024
- *[[Block cipher modes of operation/Definition]]15 KB (1,521 words) - 09:02, 2 March 2024
- ...put a block of ciphertext of the same size. Block ciphers are used in a [[Block cipher modes of operation|mode of operation]] to implement a cryptosystem.51 KB (7,594 words) - 08:36, 22 June 2024