Skip to search formSkip to main contentSkip to account menu

Disk encryption theory

Known as: LRW mode, XEX-TCB-CTS, XTS mode 
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This article… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
With the launch of Mac OS X 10.7 (Lion), Apple has introduced a volume encryption mechanism known as FileVault 2. Apple only… 
2012
2012
The open source software (OSS) makes source code available to users, who can change the softwareto modify it more closely to… 
2011
2011
In this paper, a novel approach to prevent accidental or deliberate data breaches is presented. The proposed approach provides… 
2011
2011
This paper proposes a new hardware implementation method for XTS-AES Algorithm that has a full parallel pipelined structure.The… 
2011
2011
시스템 메모리에 대한 하드웨어 공격들에 대한 보호를 제공하기 위해 암호 무결성 검사 및 리플레이 보호를 제공하는 방법 및 장치가 제공된다. 블록 암호를 위한 동작 모드는 "타임 스탬프" 표시자를 포함하도록 트윅을 확장함으로써 메모리 암호화를 수행하기 위해 표준 XTS-AES 동작 모드를 강화한다. 트리 기반의 리플레이 보호 체계는 시스템 메모리 내의 캐시 라인의 컨텐츠를 암호화하기 위해 표준 XTS-AES를 이용한다. 캐시 라인을 위한 메시지 인증 코드(MAC)는 강화된 XTS-AES, 및 캐시 라인에 연관된 "타임 스탬프" 표시자를 이용하여 암호화된다. "타임 스탬프 표시자"는 프로세서 내에 저장된다. 
2010
2010
An alternative hardware implementation of a P1619 XTS-AES architecture, compared to the typical that have been proposed by now… 
2008
2008
In this paper, we present a new narrow block mode of operation, the masked code book (MCB), that can be efficiently deployed in… 
Review
2008
Review
2008
As most research on educational computer-mediated communication (CMC) interaction has focused on the asynchronous mode, less is… 
2006
2006
A critical issue for EUV lithography EUVL is the minimization of collector degradation from intense plasma erosion, debris… 
2003
2003
The results of research and regular monitoring of the outflow of radioactive aerosols, as well as leakages of contaminated water…