Back to Results
First PageMeta Content
RC5 / MISTY1 / Key schedule / Integral cryptanalysis / RC6 / Impossible differential cryptanalysis / Ciphertext / Boomerang attack / Differential cryptanalysis / Cryptography / Block ciphers / Advanced Encryption Standard


Document Date: 2011-08-28 10:58:11


Open Document

File Size: 277,50 KB

Share Result on Facebook

Company

CBC / Texas Instruments / Knudsen / Intel / IAR Systems / the AES / /

Country

Japan / United States / /

/

Facility

CMOS ASIC library / American National Institute of Standards and Technology / Computer Science University of Twente / /

IndustryTerm

cheaper solutions / energy-efficency / brute-force search / software implementations / decryption algorithm / wireless sensor network / Wireless Sensor Networks / transmission energy / exhaustive key search / energy supply / secure algorithm / exhaustive search / energy / energy-efficient block cipher / wireless sensors / target computing platform / public-key algorithms / energy-efficiency / energy efficiency requirements / software platforms / brute force search / little energy / energy efficiency / computing / expansion algorithm / encryption algorithm / 3GPPendorsed encryption algorithm / /

OperatingSystem

GNU / /

Organization

Information-technology Promotion Agency / Cryptography Research and Evaluation Committee / European Central Bank / ASIC / University of Twente / Pieter Hartel Faculty of Electrical Engineering / American National Institute of Standards and Technology / /

Person

Wei Dai / Yee Wei Law / Rijndael / Pieter Hartel / /

Position

integrated C-Spy / /

Product

Debug / /

ProgrammingLanguage

FL / C / C++ / /

Technology

RAM / encryption algorithm / sufficiently secure algorithm / block cipher / Rijndael encryption / html / Encryption / Cryptography / ASIC / Flash memory / public-key algorithms / decryption algorithm / 3GPPendorsed encryption algorithm / key expansion algorithm / /

URL

www.iar.com / http /

SocialTag