Twofish

Results: 28



#Item
1Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2009-10-21 09:08:30
2Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-07-06 09:32:52
3

Our Newest Products: Quick Caddy Beverage Holder

Add to Reading List

Source URL: www.twofish.biz

- Date: 2008-07-07 02:29:08
    4Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

    Christian Grothoff COMP 3704 Computer Security Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2011-06-21 07:45:42
    5Cyberwarfare / Virtual private network / Stateful firewall / IPsec / Twofish / Computer network security / Computing / Computer security

    S-35 The Network Box S-35 is a member of the Network Box S-M-E product range. It is designed for smaller offices that require a VPN (to connect remote workers or branch offices to a central location), firewall, and intr

    Add to Reading List

    Source URL: www.cmssoft.co.uk

    Language: English - Date: 2015-04-01 11:10:40
    6Camellia / Twofish / ICE / Key whitening / Matrix / Feistel / Cryptography / Block ciphers / Feistel cipher

    PDF Document

    Add to Reading List

    Source URL: www.sony.co.jp

    Language: English - Date: 2011-03-09 03:41:21
    7Serpent / ARIA / Q / Key schedule / Cipher / Block size / Twofish / RC6 / Format-preserving encryption / Cryptography / Block ciphers / Advanced Encryption Standard

    PDF Document

    Add to Reading List

    Source URL: engineering.purdue.edu

    Language: English - Date: 2015-05-01 12:15:32
    8Public-key cryptography / Internet privacy / Cipher / Key / Twofish / RSA / Session key / Pretty Good Privacy / Encrypting File System / Cryptography / Key management / Cryptographic software

    Contents I Table of Contents Foreword

    Add to Reading List

    Source URL: www.bytefusion.com

    Language: English - Date: 2007-05-31 21:17:29
    9Advanced Encryption Standard / Block ciphers / S-box / Weak key / ICE / Differential cryptanalysis / Key size / MARS / Cryptanalysis / Cryptography / Key management / Twofish

    Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    10Advanced Encryption Standard / Key schedule / Cipher / ICE / Feistel cipher / Block ciphers / Key whitening / Data Encryption Standard / Cryptography / Twofish / Differential cryptanalysis

    Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    UPDATE