Tag: gcm


Found 182 results for 'gcm'.


1) encryption - Designing a secure UDP-based communication protocol
2) elliptic-curves - Implications of Shor's algorithm on $F_{2^m}$ elliptic curves and GHASH
3) aes - AES GCM encryption, authentication and PBKDF2
4) rsa - Securely generating auth tokens
5) tls - CBC related TLS cipher suites to be disabled in the server side
6) aes - How is TLS 1.3 application data encrypted with AES-GCM sent 'over the wire'?
7) aes - How does the GCM encryption limit affect TLS connections?
8) elliptic-curves - Which one is faster GCM AES-128 or Curve25519?
9) encryption - Using an AES-256-GCM key as a salt to SHA-256
10) aes - How to handle authenticated encryption for big files?
11) aes - What should I use for consequent AES key derivation?
12) aes - Does AES-GCM without security tag turn into regular CTR Mode?
13) rsa - What is the overhead of GCM? And how are GCM tags signed by RSA/PKI?
14) hash - Why does AES-GCM need a hash/MAC in TLS?
15) aes - Is there a TLS extension for generating unique IVs for AES GCM?
16) encryption - Security of authenticated encryption modes GCM & CCM
17) gcm - Using key derived using HKDF or NIST sp800-108 with AES-CCM/GCM
18) tls - What is the purpose of the "Explicit Nonce" in TLS for AES-GCM and AES-CCM?
19) aes - How to choose between AES-CCM and AES-GCM for storage volume encryption
20) aes - Is the Java function AES/CBC/PKCS5Padding vulnerable to padding oracle?
21) aes - Line by line encrypted logging stored with iv/salt/iterations. How safe is it?
22) aes - Ciphertext and tag size and IV transmission with AES in GCM mode
23) encryption - What is a safe maximum message size limit when encrypting files to disk with AES-GCM before the need to re-generate the key or NONCE
24) collision-resistance - Is there an increased risk of nonce reuse when using GCM with a nonce more than 96 bits?
25) encryption - Is it safe to use a timestamp to build a nonce?
26) implementation - Are lookup tables safe when they fit in a cache line?
27) authentication - Is it a vulnerability (for message authentication) to have a variable iteration-count for PBKDF2?
28) aes - AEAD (for AES128-GCM): is it necessary to add a zero-length AAD?
29) aes - Encryption of big files in Java with AES/GCM
30) encryption - Is this correct/incorrect password for file encryption scheme secure?
31) authenticated-encryption - Can I use a deterministic NONCE for AES-GCM file encryption if I generate "fresh" keys for each encrypted file
32) aes - Parallel file encryption and authentication for large files
33) authenticated-encryption - How to use GCM mode and associated-data properly
34) finite-field - GHASH with a finite field multiplication algorithm in reverse order
35) finite-field - modular reduction algorithm over $F_{2^m}$ doesn't seem to work when order of polynomial being reduced is small
36) encryption - How does Authentication-Key Recovery for GCM work?
37) aes - How to securely encrypt/decrypt data with a maximum chunk size?
38) aes - Minimum plaintext length for AES-GCM
39) encryption - AES-GCM encryption and decryption doubts
40) aes - AES-GCM cipher tag and IV size, while attempting to render encrypted ciphertext useless by removing them
41) aes - Using AWS KMS with AES GCM
42) aes - AES CBC Security
43) aes - TLS 1.2 Cipher Suites With AES-GCM – What data (if any) is passed to the AES-GCM cipher as the Additional Authentication Data?
44) aes - Is AES-GCM suitable for per chunk encryption?
45) hmac - Extending AES-GCM initialization vector
46) algorithm-design - Why doesn't GMAC/GCM encrypt its authentication tag?
47) encryption - Is there a point using GCM block chiper with Authenticated DH?
48) gcm - ECIES with AES-GCM
49) encryption - Plain text size limits for AES-GCM mode just 64GB?
50) aes - Can AES in CCM or GCM counter mode interoperate with AES in "plain" counter mode (CTR)?