First Page | Meta Content | |
---|---|---|
Document Date: 2007-04-02 10:30:09Open Document File Size: 123,70 KBShare Result on FacebookCompanyABC / the AES / /Currencypence / /IndustryTermtweaks was also extended to algorithms / software performance / real life systems / software applications / software evaluation / resource-constrained hardware / hardware applications / target applications / /NaturalFeatureECRYPT stream / /OrganizationEuropean Commission / /PersonMatthew Parker / Christophe de Canni / Matt Robshaw / Henri Gilbert / LEX DRAGON / LEX MICKEY / Bart Preneel / Christof Paar / LEX MAG NLS / Anne Canteaut / Vincent Rijmen / Steve Babbage (Vod) / Carlos Cid / Thomas Johansson / MICKEY MOSQUITO SFINKS / Berbain / /Technologyencryption / 2.4 Algorithms / 28 algorithms / 2.2 Algorithms / 2 Algorithms / 2.1 Algorithms / 3 The algorithms / secret key / following algorithms / 2.3 Algorithms / stream cipher / /URLwww.ecrypt.eu.org/stream/papersdir/2007/035.pdf / www.ecrypt.eu.org/stream/papersdir/2006/054.pdf / http /SocialTag |