Lines Matching refs:a
32 required if you want the system to operate in a FIPS 200
222 This converts an arbitrary crypto algorithm into a parallel
231 This is a generic software asynchronous crypto daemon that
233 into an asynchronous algorithm that executes in a kernel thread.
366 Rijndael appears to be consistently a very good performer in
367 both hardware and software across a wide range of computing
384 This is a generic implementation of AES that attempts to eliminate
389 with a more dramatic performance hit)
405 Anubis is a variable key length cipher which can use keys from
406 128 bits to 320 bits in length. It was evaluated as a entrant
418 ARIA is a standard encryption algorithm of the Republic of Korea.
434 This is a variable key length cipher which can use keys from 32
452 Camellia is a symmetric key block cipher developed jointly
504 Khazad was a finalist in the initial NESSIE competition. It is
518 SEED is a 128-bit symmetric key block cipher that has been
519 developed by KISA (Korea Information Security Agency) as a
521 It is a 16 round block cipher with the key size of 128 bit.
548 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
574 Tiny Encryption Algorithm is a simple cipher that uses
578 Xtendend Tiny Encryption Algorithm is a modification to
579 the TEA algorithm to address a potential key weakness
582 Xtendend Encryption Tiny Algorithm is a mis-implementation
593 candidate cipher by researchers at CounterPane Systems. It is a
622 the AES-256 block cipher on a single 16-byte block. On CPUs
627 underlying stream and block ciphers, subject to a security
628 bound. Unlike XTS, Adiantum is a true wide-block encryption
642 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
655 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
752 This blockcipher mode is a variant of CTR mode using XORs and little-endian
767 implementation currently can't handle a sectorsize which is not a
840 This IV generator generates an IV based on a sequence number by
841 xoring it with a salt. This algorithm is mainly useful for CTR.
852 a sequence number xored with a salt. This is the default
863 symmetric key for a block encryption pass applied to the input
867 This driver implements a crypto API template that can be
879 building for a particular system that requires it (e.g., when
963 This is used in HCTR2. It is not a general-purpose
972 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
973 to be used as a secure replacement for the 128-bit hash functions
1087 A 32-bit CRC (cyclic redundancy check) with a polynomial defined
1237 compliant with NIST SP800-90B) intended to provide a seed to a
1253 size fits into a cache (e.g. L1), only the memory access timing
1259 L1 + L2 + L3. Thus, by selecting a different memory size,
1295 The Jitter RNG operation requires a fixed amount of timing
1301 the timer is coarse) by setting the OSR to a higher value. The
1308 The test interface allows a privileged process to capture