正在加载图片...
NESSIE, CRYPTREC Multiple types of transformations: Symmetric-key block ciphers Stream ciphers Hash functions ·MACs Asymmetric encryption schemes Asymmetric digital signature schemes Asymmetric identification schemes Development of methodology of a fair evaluation and comparison of algorithms belonging to the same class including software and hardware efficiency8 Multiple types of transformations: Development of methodology of a fair evaluation and comparison of algorithms belonging to the same class, including software and hardware efficiency • Symmetric-key block ciphers • Stream ciphers • Hash functions • MACs • Asymmetric encryption schemes • Asymmetric digital signature schemes • Asymmetric identification schemes NESSIE, CRYPTREC
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有