Search results

Jump to navigation Jump to search
  • A block cipher notable for its simplicity of description and implementation (typically a f
    190 bytes (27 words) - 00:46, 1 October 2009
  • A [[block cipher]] invented by Joan Daemen and Vincent Rijmen, and a forerunner to the [[Rij
    211 bytes (29 words) - 17:13, 22 January 2010
  • '''SEED''' is a [[block cipher]] developed by the [[Korean Information Security Agency]] (KISA) and widely
    435 bytes (67 words) - 05:48, 8 April 2024
  • ...apher]] who teaches at [[Queens University]] in Canada. His specialty is [[block cipher]] design and analysis; he has published extensively in that area. ...e = 1985 }} </ref>. This is a strong version of the requirement for good [[Block cipher#Avalanche|avalanche properties]] in block ciphers; complementing any single
    1 KB (209 words) - 21:41, 26 November 2010
  • There are other RFCs covering [[block cipher modes of operation]] and how these ciphers should be used in protocols such ...Gutmann]], 973 slides in twelve sections, PDF format. Section two has the block cipher overview.
    4 KB (600 words) - 23:49, 7 June 2012
  • {{r|Block cipher}}
    828 bytes (106 words) - 14:41, 18 March 2024
  • '''RC2''' was a [[block cipher]] designed in 1987 for [[Lotus Corporation]] for use in their [[Lotus Notes '''RC5''' is a [[block cipher]] with 64-bit blocks, one of the [[Block_cipher#DES_and_alternatives|DES ge
    3 KB (436 words) - 05:49, 8 April 2024
  • {{r|Block cipher}}
    451 bytes (59 words) - 11:19, 11 January 2010
  • A block cipher specification issued by the U.S. government in 1976, intended for sensitive
    261 bytes (36 words) - 06:33, 14 June 2010
  • ...In C, the encryption and decryption routines are under 10 lines each. No [[Block cipher#S-boxes|S-boxes]] are used, so the data space required is also tiny. ...have been designed. '''Block TEA''' or '''XTEA''' extends TEA to build a [[Block cipher#Large-block_ciphers|variable block size]] cipher. '''XXTEA''' is a later re
    3 KB (367 words) - 05:49, 8 April 2024
  • {{r|Block cipher}}
    466 bytes (62 words) - 11:41, 11 January 2010
  • The '''Blowfish''' [[block cipher]] | title=Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)
    2 KB (377 words) - 05:49, 8 April 2024
  • ...al-purpose Encryption and Network Telecommunication Applications''' is a [[block cipher]]; it was [[Deutsche Telekom]]'s entry in the [[AES competition]]. Like all | title = The MAGENTA Block Cipher Algorithm
    2 KB (235 words) - 05:49, 8 April 2024
  • ...e</td><td></td><td></td><td></td><td></td><td>candidate</td><td></td><td>[[Block cipher#Whitening and tweaking|tweakable]]</td> ...d></td><td></td><td></td><td>[[Hash_(cryptography)#Skein|Skein]]</td><td>[[Block cipher#Whitening and tweaking|tweakable]]</td>
    7 KB (1,292 words) - 12:20, 27 July 2010
  • {{r|Block cipher}}
    568 bytes (75 words) - 20:10, 29 July 2010
  • ...or '''Secure and Fast Encryption Routine''', is the name for a series of [[block cipher]]s designed by [[James Massey]] and co-workers for [[Cylink]] Corporation. ...K really stands for 'Stop Knudsen', a wise precaution in the design of any block cipher".
    1 KB (221 words) - 05:48, 8 April 2024
  • * When two output blocks from a [[block cipher]] are identical, the enemy gains some information. Assuming the key has not ...2<sup>64</sup> hash operations, to find a repeated ciphertext for a 64-bit block cipher or a repetition of a 64-bit challenge, he needs to collect and store about
    3 KB (415 words) - 05:48, 8 April 2024
  • ...[[cipher]] except a [[one-time pad]]; variants of these work for either [[block cipher]]s or [[stream cipher]]s: ...attack]] &mdash; collect all possible plaintext/ciphertext pairs for a [[block cipher]], or the entire pseudorandom stream until it starts repeating for a [[stre
    3 KB (440 words) - 05:49, 8 April 2024
  • '''LOKI''' is the name of a series of [[block cipher]]s from an Australian group led by [[Jennifer Seberry]].
    1 KB (192 words) - 05:48, 8 April 2024
  • ...a technique for [[cryptanalysis]]. The name comes from the attack on a [[block cipher]]; the attacker tries to build up a "code book", a table saying which ciphe For example, consider a block cipher with only an 8 bit block size. Assume the enemy is able to get or guess som
    6 KB (1,064 words) - 02:04, 24 January 2017
View ( | ) (20 | 50 | 100 | 250 | 500)