Lines Matching refs:by

175 	  field GF(2^128).  This is needed by some cypher modes. This
177 cipher mode. Only select this option by hand if you expect to load
184 These are 'Null' algorithms, used by IPsec, which do nothing.
228 their crypto request asynchronously to be processed by this daemon.
400 This IV generator generates an IV based on a sequence number by
446 This is the Cipher Text Stealing mode as described by
447 Section 8 of rfc2040 and referenced by rfc3962.
459 the input block by block.
505 Cipher-based Message Authentication Code (CMAC) specified by
548 by iSCSI for header and data digests and by others.
662 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
673 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
735 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
752 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
764 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
776 Developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.
861 better throughput. It should not be enabled by default but
877 better throughput. It should not be enabled by default but
893 better throughput. It should not be enabled by default but
982 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
997 Tiger was developed by Ross Anderson and Eli Biham.
1020 The implementation is accelerated by CLMUL-NI of Intel.
1050 performance too much. It is intended for use by the generic CCM
1057 256 bytes each, and attempts to eliminate data dependent latencies by
1211 Blowfish cipher algorithm, by Bruce Schneier.
1223 Common parts of the Blowfish cipher algorithm shared by the
1235 Blowfish cipher algorithm (x86_64), by Bruce Schneier.
1331 Common parts of the CAST cipher algorithms shared by the
1413 FCrypt algorithm used by RxRPC.
1437 The Salsa20 stream cipher algorithm is designed by Daniel J.
1446 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1461 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1475 developed by KISA (Korea Information Security Agency) as a
1486 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1503 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1522 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1542 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1558 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1575 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
1584 The latest SM4 standard (GBT.32907-2016) was proposed by OSCCA and
1619 candidate cipher by researchers at CounterPane Systems. It is a
1629 Common parts of the Twofish cipher algorithm shared by the
1641 candidate cipher by researchers at CounterPane Systems. It is a
1657 candidate cipher by researchers at CounterPane Systems. It is a
1675 candidate cipher by researchers at CounterPane Systems. It is a
1698 candidate cipher by researchers at CounterPane Systems. It is a
1822 the kernel crypto API and can be used by any caller.