Lines Matching refs:as
150 Create default cryptographic template instantiations such as
167 Userspace configuration for cryptographic instantiations such as
184 This is intended for developer use only, as these tests take much
304 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012.
431 This is the Cipher Text Stealing mode as described by
434 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010.
550 dm-crypt. It uses the hash of the block encryption key as the
556 instantiated either as an skcipher or as an AEAD (depending on the
676 and gain better performance as compared with the table implementation.
740 CRC T10 Data Integrity Field computation is being cast as
753 crct10dif checksum as compared with the generic table implementation.
863 be used as a secure replacement for RIPEMD. For other use cases,
876 to be used as a secure replacement for the 128-bit hash functions
1066 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
1147 data dependent latencies as much as possible without affecting
1150 solely on encryption (although decryption is supported as well, but
1230 timining attacks. Nevertheless it might be not as secure as other
1242 128 bits to 320 bits in length. It was evaluated as a entrant
1546 developed by KISA (Korea Information Security Agency) as a
1648 as an authorized cryptographic algorithms for the use within China.
1690 Twofish was submitted as an AES (Advanced Encryption Standard)
1712 Twofish was submitted as an AES (Advanced Encryption Standard)
1728 Twofish was submitted as an AES (Advanced Encryption Standard)
1746 Twofish was submitted as an AES (Advanced Encryption Standard)
1769 Twofish was submitted as an AES (Advanced Encryption Standard)
1869 Enable the Hash DRBG variant as defined in NIST SP800-90A.
1876 Enable the CTR DRBG variant as defined in NIST SP800-90A.