Search results
Jump to navigation
Jump to search
- * [[Hasty Pudding (cipher)|Hasty Pudding]], a variable block size [[Block cipher#Whitening_and_tweaking|tweakable]] cipher * the 512-bit AES-like block cipher used in the [[Hash_(cryptography)#Whirlpool|Whirlpool]] hash algorithm, cal4 KB (551 words) - 12:36, 13 April 2016
- is a [[block cipher]] that was a candidate in the [[AES competition]]; it did not make it into | title = DEAL - A 128-bit Block Cipher1 KB (215 words) - 14:23, 30 September 2009
- A block cipher developed by the Korean Information Security Agency, used broadly throughou179 bytes (23 words) - 06:59, 1 October 2009
- | pagename = Block cipher modes of operation | abc = Block cipher modes of operation990 bytes (103 words) - 22:58, 1 March 2010
- {{r|Block cipher}}973 bytes (125 words) - 14:41, 18 March 2024
- New page, text from [[block cipher]]. [[User:Sandy Harris|Sandy Harris]] 10:37, 23 July 2009 (UTC)112 bytes (14 words) - 12:43, 23 July 2009
- A [[block cipher]] designed by [[James Massey]] and [[Xuejia Lai]] in 1991, intended as a re176 bytes (23 words) - 14:27, 22 May 2011
- {{r|Block cipher modes of operation}} {{r|Block cipher}}657 bytes (85 words) - 17:19, 11 January 2010
- {{r|Block cipher}}251 bytes (31 words) - 18:32, 13 March 2024
- A block cipher which was a finalist in the Advanced Encryption Standard (AES) contest, des179 bytes (26 words) - 05:41, 14 June 2010
- A US government standard issued in 2002 for a stronger [[block cipher]] to succeed the earlier [[Data Encryption Standard]].160 bytes (21 words) - 03:27, 26 October 2008
- '''E2''' is a [[block cipher]] from [[Nippon Telephone and Telegraph]]. It was candidate in the [[AES co | title = Cryptanalysis of a Reduced Version of the Block Cipher E2941 bytes (134 words) - 05:48, 8 April 2024
- {{r|Block cipher modes of operation}} {{r|Block cipher}}618 bytes (78 words) - 17:06, 11 January 2010
- A block cipher designed by Bruce Schneier and others which was a finalist in the competiti172 bytes (25 words) - 22:32, 6 October 2009
- The study of symmetric-key ciphers involves the study of [[block cipher]]s and [[stream cipher]]s and their applications. ...put a block of ciphertext of the same size. Block ciphers are used in a [[Block cipher modes of operation|mode of operation]] to implement a cryptosystem.4 KB (546 words) - 05:48, 8 April 2024
- A block cipher developed by the U.S. National Security Agency (NSA); initially classified,197 bytes (28 words) - 07:02, 1 October 2009
- '''Serpent''' is a [[block cipher]] designed by an international team of well-known researchers — [[Ros Serpent is an [[Block cipher#SP network | SP network]] with 32 rounds. It uses eight 4 by 4 S-boxes, but903 bytes (147 words) - 05:49, 8 April 2024
- A block cipher derived from the Data Encryption Standard (DES), from a design proposed in160 bytes (24 words) - 06:39, 1 October 2009
- {{r|Block cipher}}287 bytes (37 words) - 18:47, 3 January 2009
- The '''GOST cipher''' was a standard [[block cipher]] in the [[Soviet Union]]. GOST was a Soviet national standards body. There resembles [[Data Encryption Standard| DES]] in some ways; it is an iterated [[block cipher]] with a [[Feistel cipher|Feistel structure]] using eight S-boxes in the F1 KB (228 words) - 05:49, 8 April 2024