Back to Results
First PageMeta Content
Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / Data Encryption Standard / LOKI97 / Key size / AES implementations / SAFER / MAGENTA / Cryptography / Advanced Encryption Standard / Block ciphers


Status of the Advanced Encryption Standard (AES) Development Effort James Foti * National Institute of Standards and Technology Keywords: AES, Advanced Encryption Standard, cryptography, encryption.
Add to Reading List

Document Date: 1999-11-05 00:00:00


Open Document

File Size: 61,79 KB

Share Result on Facebook

City

Ventura / Rome / /

Company

IBM / Vincent Rijmen Cylink Corporation / Future Systems Inc. / Jennifer Seberry Deutsche Telekom AG / Nippon Telegraph and Telephone Corporation / Sun Microsystems Inc. / TecApro Internacional S.A. / Entrust Technologies Inc. / Microsoft / the AES / /

Country

Italy / United States / Canada / United Kingdom / Israel / /

/

Facility

National Institute of Standards and Technology Keywords / /

IndustryTerm

security technology / countless Internet / block-cipher algorithm / software suitability / finalist algorithms / candidate algorithms / /

Organization

National Security Agency / U.S. Government / NIST=s Computer Security Division / AES FIPS / Ecole Normale SupJrieure NTT / Federal Government / Institute of Standards and Technology Keywords / /

Person

Lars Knudsen / John Kelsey / Joan Daemen / James Foti / Josef Pieprzyk / Doug Whiting / Eli Biham / Richard Outerbridge / Lars Knudsen Bruce Schneier / David Wagner / Chris Hall / /

/

Position

general public comments / public candidate / author / Secretary of Commerce / /

Product

ARequest / /

ProgrammingLanguage

Java / C / Hardware Description Language / Visual C++ / C++ / /

ProvinceOrState

California / /

Region

Norway U.S. / South Korea / /

Technology

symmetric / block-cipher algorithm / candidate algorithms / Government algorithm / DES algorithm / Block cipher / fifteen candidate algorithms / five candidate algorithms / Encryption / cryptography / submitted algorithm / Java / security technology / 64-bit processors / finalist algorithms / 2 finalist algorithms / /

URL

http /

SocialTag