Back to Results
First PageMeta Content
Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function


Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:
Add to Reading List

Document Date: 2010-08-20 09:24:51


Open Document

File Size: 56,10 KB

Share Result on Facebook

City

Amsterdam / /

Company

Data Processing Systems / RSA Data Security Inc. / John Wiley and Sons / Year Later Michael Roe Cambridge University Computer Laboratory / /

/

Facility

National Institute of Standards and Technology / One Year Later Michael Roe Cambridge University Computer Laboratory / /

IndustryTerm

symmetric key algorithms / byte-oriented block-ciphering algorithm / software encryption / hash algorithms / encryption algorithm / bulk data encryption algorithm / /

MusicAlbum

April / /

OperatingSystem

Unix / /

Organization

National Institute of Standards and Technology / Cambridge University / National Bureau of Standards / State Committee for Standardization / /

Person

Ron Rivest Jim Massey / Dobb / Bill Chambers / Joan Daemen Meyer / Burt Kaliski / R. J. Anderson / Bill Chambers Stream Ciphers / Burt Kaliski Bruce Schneier Ron / Phil Rogaway Bill Chambers Ron / /

/

Position

editor / /

Product

RC4 / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Encryption / Alpha / Cryptography / 4 Algorithm / encryption algorithm / Unix / GOST encryption algorithm / block cipher / hash algorithms / cache memory / RC5 encryption algorithm / SHA algorithm / bulk data encryption algorithm / software encryption / Message-Digest Algorithm / symmetric key algorithms / byte-oriented block-ciphering algorithm / Cryptographic Transformation Algorithm / stream cipher / /

SocialTag