![Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher](https://www.pdfsearch.io/img/9fac1a873b71814c95a6473111e7f1ce.jpg)
| Document Date: 2013-01-05 09:33:40 Open Document File Size: 550,45 KBShare Result on Facebook
City Addison / / Company GMAC / TSMC / the AES / / Country United States / / IndustryTerm wireless sensors / level metal / software implementations / software footprint / AD processing / encryption algorithms / lightweight devices / software implementation profiles / synthesis tools / exhaustive search / encryption algorithm / ubiquitous devices / / Organization U. Waterloo Centre for Applied Cryptography Research / / Person Jim Frazer / Jean-Philippe Aumasson / Daniel Engels / Ai / Peter Schweitzer / Eric M. Smith / Son Cryptography / / ProvinceOrState Texas / / Technology encryption / cryptography / RAM / ISO 18000-6C protocol / 2.3 Encryption Encryption / Encryption Algorithm / 1 Introduction Authenticated encryption algorithms / block cipher / 4.1 Microcontroller Software Implementations As Hummingbird-2 algorithm / secret key / data Authenticated Encryption / 1.2 V. Encryption / Hummingbird-2 algorithm / stream cipher / /
SocialTag |