Back to Results
First PageMeta Content
Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard


ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II
Add to Reading List

Document Date: 2012-12-20 12:27:20


Open Document

File Size: 621,58 KB

Share Result on Facebook

Company

DES / the AES / /

Facility

Florida Atlantic University / /

IndustryTerm

substitution-permutation network / energy evaluation / mobile communications systems / energy consumption / target device / target technology / energy-consumption evaluations / average energy / low-power applications / similar devices / embedded devices / cryptographic algorithms / software context / encryption algorithms / permutation network / energy / e.g. software / /

Organization

European Commission / Commission of the European Communities / Raadbout Univ. / Katholieke Universiteit Leuven / Florida Atlantic University / /

Person

Ingo von Maurich / Ronny Van / Thomas Plos / Stefan Heyse / Francesco Reggazoni / Xavier Standaert / Thomas Eisenbarth / Tomislav Nad / Gilles Van Assche / /

Position

Editor / controller / years Lead contractor / /

ProgrammingLanguage

C / /

Technology

encryption / benchmarking cryptographic algorithms / cryptography / RAM / encryption algorithms / target technology / key scheduling algorithm / Block cipher / GSM / secret key / stream cipher / two algorithms / extended Euclidean algorithm / /

SocialTag