Back to Results
First PageMeta Content
Advanced Encryption Standard process / Symmetric-key algorithm / Serpent / RC6 / Twofish / MARS / Feistel cipher / LEX / Key schedule / Cryptography / Block ciphers / Advanced Encryption Standard


Document Date: 2007-09-25 01:00:00


Open Document

File Size: 383,41 KB

Share Result on Facebook

Company

Counterpane Internet Security Inc. / RSA Laboratories / Proton World International / International Business Machines Corporation / Twofish / the AES / /

Facility

Princeton University / University of California Berkeley / National Institute of Standards and Technology / Edward Roback Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Publication Date / University of California San Diego / University of Cambridge / Evaluations The National Institute of Standards and Technology / /

IndustryTerm

symmetric-key encryption algorithm / software implementations / disclosed encryption algorithm / substitution-linear transformation networks / substitution-linear transformation network / software implementation constraints / parallel applications / cryptographic algorithms / cryptographic services / software suitability / finalist algorithms / candidate algorithms / encryption algorithm / /

Organization

University of California / U.S. Government / Princeton University / Edward Roback Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Publication Date / National Institute of Standards and Technology / ASIC / University of Cambridge / Katholieke Universiteit Leuven / Technion / University of California San Diego / /

Person

Lars Knudsen / John Kelsey / Ross Anderson / Joan Daemen / James Foti / Niels Ferguson / William Burr / Lawrence Bassham / Doug Whiting / Eli Biham / James Nechvatal / Morris Dworkin / Elaine Barker / Vincent Rijmen / David Wagner / Bruce Schneier / Chris Hall / /

Position

General / /

Product

Rijndael / /

Technology

FPGA / candidate algorithms / publicly disclosed encryption algorithm / five finalist algorithms / 87 Encryption / 90 6.6 Encryption / encryption algorithm / Information Technology / 2.6 Encryption / block cipher / fifteen candidate algorithms / smart card / Integrated Circuits / Encryption / 14 2.4 Backup Algorithm / cryptography / ASIC / 4.6 Encryption / 71 3.7 Encryption / 3.6 Encryption / selected algorithms / symmetric-key encryption algorithm / finalist algorithms / stream cipher / 1.6 Encryption / fifteen algorithms / /

SocialTag