Table of Contents Introduction.............................................................................................................................................................2 � The XTS algorithm itself........................................

نویسنده

  • Kazuhiko Minematsu
چکیده

Introduction.............................................................................................................................................................2 � The XTS algorithm itself.........................................................................................................................................2 � Comments From Moses Liskov and Kazuhiko Minematsu................................................................................2 � Comments From Vijay Bharadwaj and Neils Ferguson of Microsoft..................................................................2 � Comment From Phillip Rogaway of Univ. of CA, Davis......................................................................................4 � Comment From Boaz Shahar of Entropic Communications..............................................................................5 � Comments From Michael Willett of Seagate Technology...................................................................................6 � The depth of support in the storage industry for which it was designed..................................................................7 � Current Industry Support...................................................................................................................................7 � Hard Disk Vendors...................................................................................................................................7 � AMCC (from Paul Von Stamwitz).............................................................................................................7 � Bloombase Technologies (from Harry Xiang)..........................................................................................7 � Brocade (from Scott Kipp).......................................................................................................................8 � CipherMax (from Steven Tan)..................................................................................................................8 � EMC (from David Black)..........................................................................................................................8 � Emulex (Larry Hofer)...............................................................................................................................8 � Freescale Semiconductor (from Michael Torla).......................................................................................8 � GED-i (from Rony Shapiro)......................................................................................................................9 � Helion (from Colin Sinclair)......................................................................................................................9 � Hifn (from Doug Whiting).........................................................................................................................9 � Oxford Semiconductor (from Gary Calder)..............................................................................................9 � PMC-Sierra (from Gary Nichols and Peichen Chang).............................................................................9 � SafeNet (from Marcel van Loon)..............................................................................................................9 � Thales (from Bob Lockhart).....................................................................................................................9 � TrueCrypt.................................................................................................................................................9 � WinMagic (from Gary McCracken)..........................................................................................................9 � Comment from David Clunie............................................................................................................................10 � Comments From Michael Willett of Seagate Technology.................................................................................10 � The appeal of XTS for wider applications.............................................................................................................12 � Comment From David Clunie...........................................................................................................................12 � Comments From Michael Willett of Seagate Technology.................................................................................12 � The proposal for the approved specification to be available only by purchase from IEEE....................................13 � Comment From Vijay Bharadwaj and Neils Ferguson of Microsoft..................................................................13 � Comment from Rich Schroeppel......................................................................................................................13 � Comment From David Clunie...........................................................................................................................13 � Comments From Michael Willett of Seagate Technology.................................................................................13 � General Response...........................................................................................................................................14 � Concerns of intellectual property rights.................................................................................................................14 � Comments From Vijay Bharadwaj and Neils Ferguson of Microsoft................................................................14 � Comment From David Clunie...........................................................................................................................14 � Comments From Michael Willett of Seagate Technology.................................................................................15 � General Response...........................................................................................................................................15 � Investigation NeoScale Systems' IP Claims...............................................................................................15 � IP Claims by Rogaway................................................................................................................................16 � Conclusions and Recommendations....................................................................................................................16 � Future Work..........................................................................................................................................................16 � References...........................................................................................................................................................16 �

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementing the Viola-Jones Face Detection Algorithm

..................................................................................................................................................................... 3 RESUMÉ ........................................................................................................................................................................... 4 PREFACE ...........................................

متن کامل

Comments on XTS-AES

This is a comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007 [7]. Overall, we believe that the XTS­ AES algorithm, closely based on Rogaway’s XEX mode [5] plus ciphertext stealing, is a good choice for the purpose of block-oriented data storage encryption, and the use of an algorithm of this type is well supported by research publications. We have two...

متن کامل

About the Journal, Author Information Pack & Table of Contents

About the Journal, Author Information Pack & Table of Contents

متن کامل

About The Journal and Table of Contents

About The Journal and Table of Contents

متن کامل

Micro-Computed Tomography Semi-Empirical Beam Hardening Correction: Method And Application To Meteorites

............................................................................................................................. ii Acknowledgments ............................................................................................................ iii Table of Contents .............................................................................................................. v List of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009