Back to Results
First PageMeta Content
CWC mode / OCB mode / Block cipher / Feistel cipher / Advantage / Cipher / Cryptographic hash function / Advanced Encryption Standard / EAX mode / Cryptography / Block cipher modes of operation / Authenticated encryption


Document Date: 2012-12-05 15:13:00


Open Document

File Size: 907,10 KB

Share Result on Facebook

City

Carlsbad / Perm / Berlin / /

Company

AES / UST / IRTF Crypto Forum Research Group / Bernstein / ACM Press / CBC / Hifn Inc. / /

Country

Germany / /

/

Event

Patent Filing / FDA Phase / /

Facility

Leesburg Pike / /

IndustryTerm

Internet-Draft / generation algorithm / deterministic decryption algorithm / encapsulation algorithm / deterministic encryption algorithm / randomized key generation algorithm / decryption algorithm / legacy applications / wireless working / block cipher applications / aforementioned patent applications / encryption algorithm / pre-processing / /

Organization

ASIC / Virginia Tech / /

Person

Peter Gutmann / Brian Gladman / John Viega Doug Whiting / David McGrew / David Wagner / /

/

Position

editor / /

Product

CWC / /

ProgrammingLanguage

C / K / /

ProvinceOrState

British Columbia / California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

three algorithms / encryption algorithm / two processors / XCBC encryption / block cipher / Unforgeable encryption / html / The key generation algorithm / SSL / using conven tional ASIC technology / EAX encryption / Encryption / deterministic encryption algorithm / deterministic decryption algorithm / CWC encapsulation algorithm / CTR mode encryption / CWC encryption / http / decryption algorithm / Software Encryption / randomized key generation algorithm / authenticated encryption / /

URL

http /

SocialTag