Back to Results
First PageMeta Content
Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software


Microsoft PowerPoint - preneel_enisa08v4.ppt
Add to Reading List

Document Date: 2008-10-20 04:40:05


Open Document

File Size: 592,42 KB

Share Result on Facebook

City

Car / /

Company

AES / Microchip Inc. / Whirlpool / 3DES 80 SOFTWARE / RSA HARDWARE 70 Limited / GMAC / CBC / AMD / Intel / Microsoft / /

Country

United States / Australia / /

Currency

pence / USD / /

Event

FDA Phase / Product Issues / /

Facility

National Institute of Standards and Technology / DEPARTMENT OF COMMERCE National Institute of Standards and Technology / /

IndustryTerm

car locks / pervasive computing / software performance / ubiquitous computing / search machine / manual processing / aware solutions / exhaustive key search / cases car key / internet traffic / wireless data / cryptographic algorithms / mechanical processing / low-gate count hardware / fingerprint matching algorithms / crypto algorithms / Wireless authentication protocol design Algorithm / car alarms / computing / insecure systems / secure software / /

NaturalFeature

Bluetooth stream / /

OperatingSystem

Windows NT / /

Organization

Comments AGENCY / MIT / European Central Bank / DEPARTMENT OF COMMERCE National Institute of Standards and Technology / Federal government / Post Office / /

Person

Rabin / Andrew Odlyzko / Ron Rivest / Gene Spafford / Bart Preneel / Paul D. Sheriff / Ingrid Verbauwhede / /

/

Product

27 28 The complexity / Edon-80 / 3Q12 / /

ProgrammingLanguage

Java / C / K / /

Technology

S/MIME / WEP / RAM / 250 / 000 35 36 6 Cryptographic Algorithms / 48 8 Cryptographic Algorithms / PKI / 2010 17 18 3 Cryptographic Algorithms / 6 1 Cryptographic Algorithms / Block cipher / DES algorithm / mobile phones / cloning / UMAC Authenticated encryption / SSL / 41 42 7 Cryptographic Algorithms / 57 58 Outline MAC algorithms / 1997 2002 2004 WEP WPA WPA2 802.11i digital encryption / encryption / cryptanalysis Technology / Ethernet / fingerprint matching algorithms / cryptography / 23 24 4 Cryptographic Algorithms / WLAN / Java / 54 9 Cryptographic Algorithms / puzzle Protocol / GSM / 50 40 30 20 10 0 29 30 5 Cryptographic Algorithms / TDMA / MAC algorithm / Wireless authentication protocol design Algorithm / MAC algorithms Public key encryption / VOIP / Bluetooth / Cryptographic algorithms / Authenticated encryption / stream cipher / 11 12 2 Cryptographic Algorithms / /

URL

http /

SocialTag