First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2007-09-25 01:00:00Open Document File Size: 233,20 KBShare Result on FacebookCompanyUsenet Newsgroup / Motorola / CNRS 2 France Telecom / Knudsen / Intel / the AES / / /FacilityNational Institute of Standards and Technology NIST / /IndustryTermoutdated technology / search takes / software implementation / complicated insecure algorithm / public algorithm / software implementations / block cipher algorithms / open working / exhaustive search complexity / possible future technologies / crypto-systems / on-board applications / /OperatingSystemSolaris / /OrganizationEcole Normale Sup / U.S. Department of Commerce / National Bureau of Standards / National Technical Information Service / Institute of Standards and Technology NIST / /PersonDoug Whiting / Don Coppersmith / Eli Biham / Brian Gladman / Kazumaro Aoki / Robert Harley / Johan Borst / /Positionauthor / designer / /ProductEvaluation Platform / RAM / /ProgrammingLanguageANSI C / Java / C / /ProvinceOrStateVirginia / /Technologyencryption / Alpha / virtual machine / RAM / outdated technology / block cipher algorithms / JAVA / 64-bit RISC technology / ANSI C / technology of smart cards / key scheduling algorithm / complicated insecure algorithm / API / Cast-256 Encryption Algorithm / Block Cipher / 21164 Processor / http / secret key / html / one block encryption / following algorithms / JAVA processors / complicated algorithm / /URLwww.dmi.ens.fr / /SocialTag |