First Page | Meta Content | |
---|---|---|
Document Date: 2012-12-05 15:13:00Open Document File Size: 907,10 KBShare Result on FacebookCityCarlsbad / Perm / Berlin / /CompanyAES / UST / IRTF Crypto Forum Research Group / Bernstein / ACM Press / CBC / Hifn Inc. / /CountryGermany / / /EventPatent Filing / FDA Phase / /FacilityLeesburg Pike / /IndustryTermInternet-Draft / generation algorithm / deterministic decryption algorithm / encapsulation algorithm / deterministic encryption algorithm / randomized key generation algorithm / decryption algorithm / legacy applications / wireless working / block cipher applications / aforementioned patent applications / encryption algorithm / pre-processing / /OrganizationASIC / Virginia Tech / /PersonPeter Gutmann / Brian Gladman / John Viega Doug Whiting / David McGrew / David Wagner / / /Positioneditor / /ProductCWC / /ProgrammingLanguageC / K / /ProvinceOrStateBritish Columbia / California / /PublishedMediumLecture Notes in Computer Science / /Technologythree algorithms / encryption algorithm / two processors / XCBC encryption / block cipher / Unforgeable encryption / html / The key generation algorithm / SSL / using conven tional ASIC technology / EAX encryption / Encryption / deterministic encryption algorithm / deterministic decryption algorithm / CWC encapsulation algorithm / CTR mode encryption / CWC encryption / http / decryption algorithm / Software Encryption / randomized key generation algorithm / authenticated encryption / /URLhttp /SocialTag |