Search results
Jump to navigation
Jump to search
Page title matches
- ...e</td><td></td><td></td><td></td><td></td><td>candidate</td><td></td><td>[[Block cipher#Whitening and tweaking|tweakable]]</td> ...d></td><td></td><td></td><td>[[Hash_(cryptography)#Skein|Skein]]</td><td>[[Block cipher#Whitening and tweaking|tweakable]]</td>7 KB (1,292 words) - 12:20, 27 July 2010
- * [[Hasty Pudding (cipher)|Hasty Pudding]], a variable block size [[Block cipher#Whitening_and_tweaking|tweakable]] cipher * the 512-bit AES-like block cipher used in the [[Hash_(cryptography)#Whirlpool|Whirlpool]] hash algorithm, cal4 KB (551 words) - 12:36, 13 April 2016
- #Redirect [[Block cipher]]26 bytes (3 words) - 17:18, 24 October 2008
- ...essential components in many security systems. However, just having a good block cipher does not give you security, much as just having good tires does not give yo ...iphers must withstand [[cryptanalysis]]; it is impossible to design a good block cipher, or to evaluate the security of one, without a thorough understanding of th53 KB (8,375 words) - 17:00, 19 July 2024
- There are several theses that contributed important ideas to block cipher design:2 KB (315 words) - 09:05, 27 September 2009
- ...vide a [[Block cipher/Catalogs/Cipher list|list of block ciphers]] and a [[Block cipher/Catalogs/Cipher table|table]] showing some of their properties.281 bytes (42 words) - 16:57, 10 August 2009
- 141 bytes (20 words) - 10:24, 22 October 2008
- {{r|Block cipher modes of operation}}736 bytes (94 words) - 17:00, 19 July 2024
- There are other RFCs covering [[block cipher modes of operation]] and how these ciphers should be used in protocols such ...Gutmann]], 973 slides in twelve sections, PDF format. Section two has the block cipher overview.4 KB (600 words) - 23:49, 7 June 2012
- #REDIRECT [[Block cipher/Catalogs/Cipher list]]47 bytes (6 words) - 01:46, 9 August 2009
- ...ciphertext. A block cipher '''mode of operation''' specifies how multiple block cipher operations are to be combined to accomplish some larger task such as encryp ...Cipher Modes of Operation" <ref>{{cite paper | title = Recommendation for Block Cipher Modes of Operation | publisher = National Institute for Standards & Technol8 KB (1,301 words) - 17:00, 19 July 2024
- 50 bytes (6 words) - 22:47, 24 July 2009
- Methods of combining multiple block cipher operations to achieve a larger goal.115 bytes (15 words) - 03:31, 23 May 2009
- Auto-populated based on [[Special:WhatLinksHere/Block cipher modes of operation]]. Needs checking by a human. {{r|Block cipher}}722 bytes (93 words) - 17:00, 19 July 2024
Page text matches
- ...Russian government standard symmetric key block cipher; also based on this block cipher is the GOST hash function.164 bytes (24 words) - 06:48, 1 October 2009
- ...vide a [[Block cipher/Catalogs/Cipher list|list of block ciphers]] and a [[Block cipher/Catalogs/Cipher table|table]] showing some of their properties.281 bytes (42 words) - 16:57, 10 August 2009
- ...Chaining]], a [[Block_cipher_modes_of_operation|mode of operation]] for [[block cipher]]s.285 bytes (39 words) - 21:40, 24 November 2011
- {{r|Block cipher}} {{r|Block cipher}}990 bytes (131 words) - 12:00, 4 July 2024
- #REDIRECT [[Block cipher/Catalogs/Cipher list]]47 bytes (6 words) - 01:46, 9 August 2009
- The common name for the Triple Data Encryption Algorithm (TDEA) block cipher, named because it applies the Data Encryption Standard (DES) cipher algorit223 bytes (32 words) - 00:50, 1 October 2009
- The '''Hasty Pudding Cipher''' or '''HPC''' is a [[block cipher]] designed by [[Rich Schroeppel]]. It was, in some ways, the most interesti ...It therefore might be ideal for things like encrypting disk blocks; see [[Block cipher#Large-block ciphers| large block ciphers]]. Also, quoting the home page "Ar1 KB (179 words) - 05:49, 8 April 2024
- ...ty expert, best known for designing the [[CAST (cipher)|CAST]] family of [[block cipher]]s.157 bytes (21 words) - 14:01, 22 May 2011
- [[Feistel cipher]]s, a class of [[block cipher]], are named after him.269 bytes (38 words) - 09:03, 6 October 2010
- A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key leng202 bytes (28 words) - 23:59, 30 September 2009
- A block cipher, designed in 1993 by Bruce Schneier and included in a large number of ciphe160 bytes (23 words) - 05:59, 14 June 2010
- ...the winning candidate in the [[AES competition]]. Like AES, Square is a [[Block cipher#SP networks|substitution-permutation network]] operating on 128-bit blocks.659 bytes (101 words) - 05:48, 8 April 2024
- A block cipher developed jointly by Mitsubishi and NTT in 2000, which has similar design e174 bytes (25 words) - 06:27, 1 October 2009
- {{r|Block cipher modes of operation}}736 bytes (94 words) - 17:00, 19 July 2024
- #Redirect [[Block cipher]]26 bytes (3 words) - 17:18, 24 October 2008
- | title = CRYPTON: A New 128-bit Block Cipher - Specification and Analysis (Version 1.0) | title = Hardware Design and Performance Estimation of The 128-bit Block Cipher CRYPTON1,005 bytes (151 words) - 14:12, 30 September 2009
- '''Camellia''' is a [[block cipher]] from [[Mitsubshi]] and [[Nippon Telephone and Telegraph]]. It can be used783 bytes (126 words) - 05:48, 8 April 2024
- A block cipher authored by Georgoudis, Leroux and Chaves, which can work with any block si202 bytes (29 words) - 06:45, 1 October 2009
- ...n network]] such as Square, k is often chosen to be the size of a single [[Block cipher#S-boxes|S-box]]. The attack has since been applied to a number of other cip1 KB (171 words) - 05:48, 8 April 2024
- {{r|Block cipher}} {{r|Block cipher}}421 bytes (55 words) - 07:01, 30 July 2024