, The Advanced Encryption Standard (AES), vol.197, 2001.

, IEEE Standard for Authenticated Encryption With Length Expansion for Storage Devices, IEEE Std, vol.1619, pp.1-2007, 2008.


, LUKS: Linux Unified Key Setup, 2017.

, Linux mainline kernel archive, 2018.

G. Alendal, got HW crypto? On the (in)security of a Self-Encrypting Drive series, IACR Cryptology ePrint Archive, 2015.

J. Axboe, , 2017.

L. N. Bairavasundaram, An analysis of data corruption in the storage stack, ACM Transactions on Storage, vol.4, issue.3, 2008.

M. Bellare, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, J. Cryptol, vol.21, issue.4, 2008.

D. J. Bernstein, ChaCha, a variant of Salsa20, 2008.

H. Böck, Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. IACR Cryptology ePrint Archive, 2016.

M. Bro?, Practical Cryptographic Data Integrity Protection with Full Disk Encryption, 2018.

P. J. Dawidek, FreeBSD GELI encryption system, 2011.

M. Van-dijk, Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks, Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing. STC '07, 2007.

R. C. Dowdeswell, Initial Analysis of GBDE, 2003.

M. J. Dworkin, SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, 2007.

M. J. Dworkin, SP 800-38E. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, 2010.

N. Ferguson, AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista, 2006.

N. Ferguson, Cryptography Engineering: Design Principles and Practical Applications, 2010.

C. Fruhwirth, New methods in hard disk encryption, 2005.

K. Gjøsteen, Security Notions for Disk Encryption, ESORICS 2005: 10th European Symposium on Research in Computer Security, 2005.

S. Gueron, GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte, Cryptology ePrint Archive, 2015.

K. Holt, End-to-End Data Protection Justification, 2003.

P. H. Kamp, GBDE: GEOM Based Disk Encryption, Proceedings of the BSD Conference 2003 on BSD Conference. USENIX, 2003.

L. Khati, Full Disk Encryption: Bridging Theory and Practice, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01403418

A. Krioukov, Parity Lost and Parity Regained, Proceedings of the 6th USENIX Conference on File and Storage Technologies. USENIX Association, 2008.

Y. Lindell, AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption, 2017.

T. Martin, The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Journal of Digital Forensics, Security and Law, vol.4, issue.4, 2016.

Y. Nir, ChaCha20 and Poly1305 for IETF Protocols, vol.7539, 2015.

M. K. Petersen, T10 Data Integrity Feature (Logical Block Guarding, 2007.

E. Riedel, A Framework for Evaluating Storage System Security, Proceedings of the 1st USENIX Conference on File and Storage Technologies, vol.2, 2002.

P. Rogaway, Authenticated-encryption with associated-data, Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.

M. J. Saarinen, Encrypted Watermarks and Linux Laptop Security, Workshop on Information Security Applications, Revised Selected Papers, 2005.

J. Satran, Internet Protocol Small Computer System Interface (iSCSI) Cyclic Redundancy Check (CRC)/Checksum Considerations, RFC, vol.7539, 2015.

G. Sivathanu, Ensuring data integrity in storage: Techniques and applications, ACM Workshop on Storage Security and Survivability, 2005.

M. Tischer, Users Really Do Plug in USB Drives They Find, 2016 IEEE Symposium on Security and Privacy, 2016.

S. Türpe, Attacking the BitLocker Boot Process, Proceedings of the 2nd International Conference on Trusted Computing. Trust '09, 2009.

Y. Zhang, End-to-end Data Integrity for File Systems: A ZFS Case Study, Proceedings of the 8th USENIX Conference on File and Storage Technologies. USENIX Association, 2010.