First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2007-09-25 01:00:00Open Document File Size: 383,41 KBShare Result on FacebookCompanyCounterpane Internet Security Inc. / RSA Laboratories / Proton World International / International Business Machines Corporation / Twofish / the AES / /FacilityPrinceton University / University of California Berkeley / National Institute of Standards and Technology / Edward Roback Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Publication Date / University of California San Diego / University of Cambridge / Evaluations The National Institute of Standards and Technology / /IndustryTermsymmetric-key encryption algorithm / software implementations / disclosed encryption algorithm / substitution-linear transformation networks / substitution-linear transformation network / software implementation constraints / parallel applications / cryptographic algorithms / cryptographic services / software suitability / finalist algorithms / candidate algorithms / encryption algorithm / /OrganizationUniversity of California / U.S. Government / Princeton University / Edward Roback Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Publication Date / National Institute of Standards and Technology / ASIC / University of Cambridge / Katholieke Universiteit Leuven / Technion / University of California San Diego / /PersonLars Knudsen / John Kelsey / Ross Anderson / Joan Daemen / James Foti / Niels Ferguson / William Burr / Lawrence Bassham / Doug Whiting / Eli Biham / James Nechvatal / Morris Dworkin / Elaine Barker / Vincent Rijmen / David Wagner / Bruce Schneier / Chris Hall / /PositionGeneral / /ProductRijndael / /TechnologyFPGA / candidate algorithms / publicly disclosed encryption algorithm / five finalist algorithms / 87 Encryption / 90 6.6 Encryption / encryption algorithm / Information Technology / 2.6 Encryption / block cipher / fifteen candidate algorithms / smart card / Integrated Circuits / Encryption / 14 2.4 Backup Algorithm / cryptography / ASIC / 4.6 Encryption / 71 3.7 Encryption / 3.6 Encryption / selected algorithms / symmetric-key encryption algorithm / finalist algorithms / stream cipher / 1.6 Encryption / fifteen algorithms / /SocialTag |