Back to Results
First PageMeta Content
Information theory / Key management / Linear congruential generator / Random number generation / Random number generator attack / Entropy / Randomizer / One-time pad / Pseudorandomness / Cryptography / Randomness / Pseudorandom number generators


Document Date: 2003-12-11 08:24:36


Open Document

File Size: 128,85 KB

Share Result on Facebook

City

Cairo / /

Company

AES / Intel / Twofish / /

Currency

USD / /

/

IndustryTerm

cipher algorithm / software implementation / cryptographic applications / encryption algorithm operator / Software generators / security protocols / sur Internet / /

Organization

US Federal Reserve / Faculty of Eng / /

Person

Yasser Dakroury / John Kelsey / Ain Shams Uni / Bruce Schneier / Gamal Hussein / Ahmed Badr / /

Position

driver / computer operator / designer / one of the possible family members / one of the TSRG family members / programmer / /

Technology

encryption / BBS / following algorithm / parametric multiplicative LCG algorithm / ASCII / block cipher / encryption system / security protocols / operating system / IDEA cipher algorithm / IDEA algorithm / /

SocialTag