Tags
- 128-bit
- 1962 United States Tri-Service aircraft designation system
- 2048
- 256-bit
- 2nd SS Panzer Division Das Reich
- 6
- 64-bit computing
- A
- Aad
- Accelerator
- Accept
- Achievement
- Actual
- Ad
- Adaptation
- Adopted
- Adversary
- AES
- AES instruction set
- AI
- Algorithm
- Algorithms
- A mode
- An
- Analysis
- And then
- Annotation
- ANSI
- Anthony Moore
- Appendix
- Application
- Appropriation
- Approximately
- Arbitrarily large
- Arbitrariness
- Architecture
- Archive
- Arithmetic
- A series
- Assurance
- Attack
- Attacker
- Auth
- Authenticated encryption
- Authentication
- Authentication code
- Authenticity
- Authors
- Automatic parallelization
- Based on
- Basic
- Bavarian C I
- Bear
- Bear in Mind
- Becker Jurgen
- Belong
- Berlin
- Be Used To
- Bit-length
- Bit rate
- Bits
- Bitwise
- Bitwise operation
- Block
- Block cipher
- Block cipher mode of operation
- Block size
- Bound
- Bubble
- Byte
- Bytes
- Calculation
- Camellia Cipher
- Carry-less product
- CBC
- Central processing unit
- Chaining
- Channel
- Channels
- Characteristic
- Choice
- Choose
- Cipher
- Ciphers
- Cipher suite
- Ciphertext
- CiteSeerX
- Class
- Class of
- Clavier
- CLMUL instruction set
- CNSA
- Code
- Codes
- Coefficient
- Coefficients
- Combination
- Combine
- Combined
- Comfort object
- Communication
- Communication channels
- Complex
- Compromised
- Computation
- Compute!
- Computer
- Computer Science
- Computer security
- Concatenation
- Concrete
- Concrete security
- Confidentiality
- Considered
- Constant
- Constraint
- Constructed
- Construction
- Containment
- Contrast
- Convention
- Correctness
- Counter
- Cryptographic algorithms
- Cryptographic hardware
- Cryptographic protocol
- Cryptography
- Cryptology
- Cryptology ePrint Archive
- CSRC
- CWC
- Cycle
- Cycles
- Cycles per byte
- Cycling
- Data
- Data rate units
- David Gregg
- Defined
- Denotation
- Described
- D.O.E.
- Domination
- Ease
- Eds Fast
- Eds Progress
- Efficiency
- Efficient
- Embedded
- Embedded system
- Enabling
- Encoding
- Encrypt
- Encryption
- Ending
- Engines
- Eprint
- E.S.P.
- Essential
- E.T.
- Ethernet
- Every
- Exclusive or
- Execution
- Expense
- Exploitation
- Factor
- Fast Software Encryption
- Feeding
- Feghali
- Felber
- Fiber
- Fibre Channel
- Field
- Field arithmetic
- Field-programmable gate array
- Finite
- Finite field
- Finite field arithmetic
- Fish measurement
- Five
- Following
- Forgery
- Forging
- Formula
- FSE
- Gain
- Gaj
- Galois
- Galois/Counter Mode
- GCM
- GCM1
- Generate
- Generation
- Generator
- Germain Counter
- Gib Nist
- Glenn Verbauwhede
- GMAC
- Guéron
- Guidance
- Guideline
- Guidelines
- Guilford
- Gupta Kc
- H
- Hamper
- Hardware
- Hardware acceleration
- Hash key
- Heidelberg
- Highlight
- High-performance
- High Speed
- Hofmann
- Horner
- Horner's method
- IEEE 802.1AE
- IEEE P1619
- If
- Il Successo
- Implement
- Implementation
- Impressive
- In C
- Include
- Includes
- Increment
- Indocrypt
- Initialization
- Initialization vector
- Input
- Insight
- Insights
- Institute of Electrical and Electronics Engineers
- Instruction
- Instruction-level parallelism
- Instruction pipelining
- Instructions
- Integrity
- Intel Architecture
- Intel Ha
- Intellectual
- Intellectual Property
- Intel processors
- Interleaving
- International Committee for Information Technology Standards
- International Standard Book Number
- IPsec
- Iteration
- Iterative method
- J
- John By
- John Viega
- Jurgen September
- K
- Käsper
- Kc Eds
- Known
- Krasnov
- L
- Labeled
- Labs
- latest
- Layer
- Leak
- Lecture
- Lecture notes
- Lecture Notes in Computer Science
- Lemma
- Lena Mod
- Length
- Less
- Lifetime
- Lightsaber
- Likelihood function
- Limit
- M
- Mạc
- Macs
- Magnetic tape data storage
- Matchbook
- Matches
- Mathematical optimization
- Maximal
- McGrew
- Méier
- Message
- Message authentication
- Message authentication code
- Messages
- Method
- Methods
- Mind
- Mode Block
- Modes
- Modest
- Monitor
- Most
- Much
- Multiples
- Multiplication
- Multiplication algorithm
- Multiplication sign
- N
- N+1
- National security
- Need
- New
- Nigger
- NIST
- No
- Normal
- Note
- NSA
- NSA Suite B Cryptography
- NSS
- Number
- Object
- Observation
- Öztürk
- Oldowan
- Only
- OpenSSL
- OpenVPN
- Operations
- Optimization
- Output
- Over
- Overlap
- P
- P5
- Packet
- Packet size
- Paillier cryptosystem
- Paper
- Parallel computing
- Parallelism
- Parallel processing
- Parameter
- Particular
- Payload
- Perform
- Performance
- Perminov
- Permit
- Permutation
- Perspective
- Pipeline
- Plain
- Plain text
- Plaintext
- Platform
- PLU
- Polynomial
- PP
- Pre-exponential factor
- Prepared
- Prime number
- Principle
- Probability
- Probability measure
- Proceedings
- Processing
- Processor
- Produce
- Producer
- Property
- Proportionality
- Protocol
- Protocols
- Proven
- Publication
- Publishing
- Random
- Random permutation
- Rangefinder
- Real World
- Reception
- Recipient
- Recommendation
- Recover
- Reduce
- Reduction
- Register
- Registration
- Remains
- Replacement
- Representation
- Representations
- Require
- Resistance
- Resource
- Resource center
- Result
- Return to Cookie Mountain
- Reuter
- Roy Bimal
- Saarinen
- Scalability
- Schwabe
- Science
- Second
- Secure
- Secure Shell
- Security
- Security parameter
- Security protocols
- Selection
- Serie A
- Series and parallel circuits
- Server
- Shell Transport
- Short
- Shorter
- Shortland Street
- Shown
- Silicon
- Silicon Labs
- Simplicity
- Single
- Slice
- Slices
- SoftEther VPN
- Software
- Software encryption
- Software implementation
- Some
- Sophie Germain
- Sophie Germain Counter Mode
- Sophie Germain prime
- SPARC
- Specialization
- Speed
- Springer
- Stall
- State of the Art
- Still
- Storage
- Stream
- Stream cipher
- Strength
- String
- Strings
- Subkey
- Submission
- Subsequent
- Success
- Suit
- Suite
- Survival
- Symmetry
- Systems
- Tadayoshi
- Tag
- Tags
- Tape
- Target
- Targeted
- Technical
- Technical report
- Text
- The Adversary
- The Algorithm
- The Block
- The first
- The Formula
- Then
- The Parallel
- The Variable
- Third generation
- Throughput
- Throughput rate
- T.I.
- TLS
- Total
- Transport
- Transport layer
- Transport Layer Security
- Typo
- Unsuccessful
- Upper and lower bounds
- Uses
- U.S. Route 395
- V
- Valid
- Values
- Variable
- Variant
- Vector Iv
- Verification
- Verify
- Via
- Viega
- Virtual private network
- Vlad Krasnov
- Vol
- VPN
- W
- Weak
- Weaknesses
- Well known
- When
- Whiting
- WIFI
- Wifi security
- Wikipedia
- Willi Eds
- Wireless Gigabit Alliance
- Words
- Workshop
- X&Y
- XOR
- Zero