Back to Results
First PageMeta Content
Data Encryption Standard / Advanced Encryption Standard process / Decorrelation theory / DFC / Hasty Pudding cipher / RC6 / CRYPTON / AES implementations / Serpent / Cryptography / Block ciphers / Advanced Encryption Standard


Document Date: 2007-09-25 01:00:00


Open Document

File Size: 233,20 KB

Share Result on Facebook

Company

Usenet Newsgroup / Motorola / CNRS 2 France Telecom / Knudsen / Intel / the AES / /

/

Facility

National Institute of Standards and Technology NIST / /

IndustryTerm

outdated technology / search takes / software implementation / complicated insecure algorithm / public algorithm / software implementations / block cipher algorithms / open working / exhaustive search complexity / possible future technologies / crypto-systems / on-board applications / /

OperatingSystem

Solaris / /

Organization

Ecole Normale Sup / U.S. Department of Commerce / National Bureau of Standards / National Technical Information Service / Institute of Standards and Technology NIST / /

Person

Doug Whiting / Don Coppersmith / Eli Biham / Brian Gladman / Kazumaro Aoki / Robert Harley / Johan Borst / /

Position

author / designer / /

Product

Evaluation Platform / RAM / /

ProgrammingLanguage

ANSI C / Java / C / /

ProvinceOrState

Virginia / /

Technology

encryption / Alpha / virtual machine / RAM / outdated technology / block cipher algorithms / JAVA / 64-bit RISC technology / ANSI C / technology of smart cards / key scheduling algorithm / complicated insecure algorithm / API / Cast-256 Encryption Algorithm / Block Cipher / 21164 Processor / http / secret key / html / one block encryption / following algorithms / JAVA processors / complicated algorithm / /

URL

www.dmi.ens.fr / /

SocialTag