Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,197,153 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption theory
Known as:
LRW mode
, XEX-TCB-CTS
, XTS mode
Expand
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This article…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Adversary (cryptography)
BestCrypt
BitLocker
Block (data storage)
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
COULÛIŒTRIC TITRATION OF ACIDS IN NCl ' TAQUEOUS SOL-. ' Ï ' XTS by Prank
F. E. Gainer
2017
Corpus ID: 19581104
2016
2016
Constructive Side-Channel Analysis and Secure Design
François-Xavier Standaert
,
E. Oswald
Lecture Notes in Computer Science
2016
Corpus ID: 32430248
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access…
Expand
2013
2013
Parallelization of AES algorithm for disk encryption using CBC and ICBC modes
Akshay Desai
,
Krishna Ankalgi
,
Harish Yamanur
,
S. S. Navalgund
International Conference on Computing…
2013
Corpus ID: 15177414
Computers have become more prevalent and their interconnection via networks has increased the dependence of both organizations…
Expand
2012
2012
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary
,
Felix Gröbert
,
J. Metz
IACR Cryptology ePrint Archive
2012
Corpus ID: 5961213
With the launch of Mac OS X 10.7 (Lion), Apple has introduced a volume encryption mechanism known as FileVault 2. Apple only…
Expand
2011
2011
TrustBox: A Security Architecture for Preventing Data Breaches
Matthias Schmidt
,
S. Fahl
,
Roland Schwarzkopf
,
Bernd Freisleben
International Euromicro Conference on Parallel…
2011
Corpus ID: 14752695
In this paper, a novel approach to prevent accidental or deliberate data breaches is presented. The proposed approach provides…
Expand
2011
2011
AES finalists implementation for GPU and multi-core CPU based on OpenCL
Xingliang Wang
,
Xiaochao Li
,
Mei Zou
,
Jun Zhou
IEEE International Conference on Anti…
2011
Corpus ID: 966837
Benefit from the OpenCL (Open Computing Language), applications can be easily transplanted among different GPUs, multi-core CPUs…
Expand
2010
2010
Implementation of a P1619 crypto-core for Shared Storage Media
Epameinontas Hatzidimitriou
,
A. Kakarountas
Melecon - 15th IEEE Mediterranean…
2010
Corpus ID: 24952431
An alternative hardware implementation of a P1619 XTS-AES architecture, compared to the typical that have been proposed by now…
Expand
2006
2006
Ion debris characterization from a z-pinch extreme ultraviolet light source
E. Antonsen
,
K. Thompson
,
M. Hendricks
,
D. A. Alman
,
B. Jurczyk
,
D. Ruzic
2006
Corpus ID: 14025618
An XTREME Technologies XTS 13-35 extreme ultraviolet (EUV) light source creates a xenon z pinch that generates 13.5nm light. Due…
Expand
2006
2006
Development status of EUV sources for use in beta-tools and high-volume chip manufacturing tools
Uwe Stamm
,
J. Kleinschmidt
,
+8 authors
Vladimir M. Borisov
SPIE Advanced Lithography
2006
Corpus ID: 111008428
In the paper we give an update about the development status of gas discharge produced plasma (GDPP) EUV sources at XTREME…
Expand
1990
1990
Seed detection of Xanthomonas campestris pv. undulosa using a modification of Wilbrink's agar medium
E. Duveiller
1990
Corpus ID: 27957809
Wilbrink' s-boric acid-cephalexin agar medium (WBC) was developed and tested for iso lating Xalllhomonas campeslris pv…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE