Back to Results
First PageMeta Content
Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions


Document Date: 2013-02-07 00:29:28


Open Document

File Size: 322,89 KB

Share Result on Facebook

Company

AES / Synopsys / GE / /

/

Facility

CMOS library / store T1 / Computer Engineering University of Waterloo Waterloo / /

IndustryTerm

lightweight algorithms / look-up algorithms / cryptographic algorithms / lightweight devices / wireless sensor networks / computing / exhaustive key search / tiny devices / target algorithm / integrated circuit printing / /

Organization

Guang Gong Department of Electrical / Electrical and Computer Engineering University of Waterloo Waterloo / US Federal Reserve / U.S. Securities and Exchange Commission / /

Person

Guang Gong / Bo Zhu / Block Ciphers / /

Position

first forward / /

Technology

encryption / target algorithm / lightweight algorithms / look-up algorithms / one DES encryption / block cipher / caching / SSL / RFID chips / integrated circuit / /

SocialTag