Lines Matching refs:a
31 required if you want the system to operate in a FIPS 200
182 This converts an arbitrary crypto algorithm into a parallel
191 This is a generic software asynchronous crypto daemon that
193 into an asynchronous algorithm that executes in a kernel thread.
331 This IV generator generates an IV based on a sequence number by
332 xoring it with a salt. This algorithm is mainly useful for CTR
342 a sequence number xored with a salt. This is the default
385 See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final
402 LRW: Liskov Rivest Wagner, a tweakable, non malleable, non movable
413 OFB: the Output Feedback mode makes a block cipher into a synchronous
415 with the plaintext blocks to get the ciphertext. Flipping a bit in the
416 ciphertext produces a flipped bit in the plaintext at the same
436 can't handle a sectorsize which is not a multiple of 16 bytes.
474 Adiantum is a tweakable, length-preserving encryption mode
479 the AES-256 block cipher on a single 16-byte block. On CPUs
484 underlying stream and block ciphers, subject to a security
485 bound. Unlike XTS, Adiantum is a true wide-block encryption
498 symmetric key for a block encryption pass applied to the input
502 This driver implements a crypto API template that can be
503 instantiated either as a skcipher or as a aead (depending on the
514 building for a particular system that requires it (e.g., when
555 VMAC is a message authentication algorithm designed for
647 a crypto transform. This allows for faster crc t10 diff
684 It is not a general-purpose cryptographic hash function.
761 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
762 be used as a secure replacement for RIPEMD. For other use cases,
774 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
775 to be used as a secure replacement for the 128-bit hash functions
789 RIPEMD-256 is an optional extension of RIPEMD-128 with a
791 longer hash-results, without needing a larger security level
801 RIPEMD-320 is an optional extension of RIPEMD-160 with a
803 longer hash-results, without needing a larger security level
891 This version of SHA implements a 256 bit hash with 128 bits of
894 This code also includes SHA-224, a 224 bit hash with 112 bits
930 This version of SHA implements a 512 bit hash with 256 bits of
933 This code also includes SHA-384, a 384 bit hash with 192 bits
993 Tiger is a hash function optimized for 64-bit processors while
1033 Rijndael appears to be consistently a very good performer in
1034 both hardware and software across a wide range of computing
1051 This is a generic implementation of AES that attempts to eliminate
1056 with a more dramatic performance hit)
1080 Rijndael appears to be consistently a very good performer in
1081 both hardware and software across a wide range of computing
1109 Rijndael appears to be consistently a very good performer in
1110 both hardware and software across a wide range of computing
1145 Anubis is a variable key length cipher which can use keys from
1146 128 bits to 320 bits in length. It was evaluated as a entrant
1163 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
1175 This is a variable key length cipher which can use keys from 32
1199 This is a variable key length cipher which can use keys from 32
1213 Camellia is a symmetric key block cipher developed jointly
1230 Camellia is a symmetric key block cipher developed jointly
1250 Camellia is a symmetric key block cipher developed jointly
1266 Camellia is a symmetric key block cipher developed jointly
1282 Camellia is a symmetric key block cipher developed jointly
1387 Khazad was a finalist in the initial NESSIE competition. It is
1400 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
1412 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1442 SEED is a 128-bit symmetric key block cipher that has been
1443 developed by KISA (Korea Information Security Agency) as a
1445 It is a 16 round block cipher with the key size of 128 bit.
1457 of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
1543 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
1568 Tiny Encryption Algorithm is a simple cipher that uses
1572 Xtendend Tiny Encryption Algorithm is a modification to
1573 the TEA algorithm to address a potential key weakness
1576 Xtendend Encryption Tiny Algorithm is a mis-implementation
1587 candidate cipher by researchers at CounterPane Systems. It is a
1609 candidate cipher by researchers at CounterPane Systems. It is a
1625 candidate cipher by researchers at CounterPane Systems. It is a
1643 candidate cipher by researchers at CounterPane Systems. It is a
1666 candidate cipher by researchers at CounterPane Systems. It is a
1786 The Jitterentropy RNG is a noise that is intended