Back to Results
First PageMeta Content
Pseudorandomness / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Keystream / SEAL / Cipher / SHA-1 / Block cipher / Cryptography / Stream ciphers / Theoretical computer science


To appear in J. of Cryptology
Add to Reading List

Document Date: 2008-09-21 22:35:16


Open Document

File Size: 246,33 KB

Share Result on Facebook

Company

IBM / /

Country

United States / /

Currency

pence / /

/

Facility

Engineering II Building / University of California / /

IndustryTerm

software-oriented cryptography / software-e cient stream cipher / software-e cient cryptography / software-e cient ciphers / software cryp / typical applications / table-driven algorithm / software-e cient encryption algorithm / software-e cient algorithms / cryptographic hardware / earlier software-oriented block cipher / software-optimized cryptography / software execution / cryptographic algorithm / software cryptography / software-e cient block cipher / /

Organization

University of California / Davis / Department of Computer Science / /

ProgrammingLanguage

L / /

ProvinceOrState

California / /

Technology

Encryption / three software-e cient algorithms / Cryptography / Intel386TM/Intel486TM/PentiumTM processors / revised Secure Hash Algorithm / hardware-oriented Data Encryption Algorithm / underlying algorithm / Pentium processors / Software Encryption Algorithm / software-e cient encryption algorithm / data encryption / block cipher / DES algorithm / table-driven algorithm / Software encryption / Pentium processor / Stream cipher / cryptographic algorithm / /

SocialTag