128-bit

Results: 56



#Item
11Data types / Primitive types / Information / Computer architecture / Exabyte / Central processing unit / Multiply–accumulate operation / 128-bit / 64-bit / Computer arithmetic / Computing / Units of information

Architecture and Design David May David May 1

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2006-06-20 03:50:56
12Data types / Primitive types / Information / Computer architecture / Exabyte / Central processing unit / Multiply–accumulate operation / 128-bit / 64-bit / Computer arithmetic / Computing / Units of information

Architecture and Design David May David May 1

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2006-06-20 03:50:56
13Keystream / A5/1 / Cryptography / Stream ciphers / Linear feedback shift register

Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2010-01-29 01:17:36
14Key schedule / ICE / Camellia

Speci cation of Camellia | a 128-bit Block Cipher Kazumaro AOKI y, Tetsuya ICHIKAWA z, Masayuki KANDA y, Mitsuru MATSUI z, Shiho MORIAI y, Junko NAKAJIMA z, Toshio TOKITA z

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:44
15Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21
16Numerical linear algebra / Computer architecture / LAPACK / Parallel computing / Microprocessors / FLOPS / Cell / PBLAS / 128-bit / Computing / Numerical software / Numerical analysis

PDF Document

Add to Reading List

Source URL: www.netlib.org

Language: English - Date: 2006-07-04 09:58:05
17Blowfish / Advanced Encryption Standard / MacGuffin / Feistel cipher / ICE / Lucifer / SAFER / S-box / Khufu and Khafre / Cryptography / Block ciphers / Twofish

Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
18Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
19Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
20Camellia / Twofish / ICE / Key whitening / Matrix / Feistel / Cryptography / Block ciphers / Feistel cipher

The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
UPDATE