Back to Results
First PageMeta Content
Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE


Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.
Add to Reading List

Document Date: 2004-12-30 09:37:46


Open Document

File Size: 265,46 KB

Share Result on Facebook

City

Boston / Ottawa / /

Company

Knudsen / M. ADAMS Entrust Technologies / /

Country

Netherlands / Canada / /

/

IndustryTerm

construction algorithm / encryption algorithms / bit selection algorithm / specified key scheduling algorithm / replacement algorithms / substitution-permutation network / symmetric encryption algorithms / “improved” algorithm / exhaustive search / bit-selection algorithm / software implementations / replacement algorithm / /

Person

Evangelos Kranakis / /

Technology

encryption / bit selection algorithm / Cryptography / bit-selection algorithm / DES replacement algorithms / encryption algorithms / DES replacement algorithm / construction algorithm / symmetric encryption algorithms / specified key scheduling algorithm / /

SocialTag