Lines Matching +full:128 +full:a

32 	  required if you want the system to operate in a FIPS 200
222 This converts an arbitrary crypto algorithm into a parallel
231 This is a generic software asynchronous crypto daemon that
233 into an asynchronous algorithm that executes in a kernel thread.
367 Rijndael appears to be consistently a very good performer in
368 both hardware and software across a wide range of computing
376 The AES specifies three key sizes: 128, 192 and 256 bits
385 Anubis is a variable key length cipher which can use keys from
386 128 bits to 320 bits in length. It was evaluated as a entrant
398 ARIA is a standard encryption algorithm of the Republic of Korea.
400 128-bit: 12 rounds.
414 This is a variable key length cipher which can use keys from 32
432 Camellia is a symmetric key block cipher developed jointly
435 The Camellia specifies three key sizes: 128, 192 and 256 bits.
446 tristate "CAST5 (CAST-128)"
450 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
484 Khazad was a finalist in the initial NESSIE competition. It is
486 on 32-bit processors. Khazad uses an 128 bit key size.
498 SEED is a 128-bit symmetric key block cipher that has been
499 developed by KISA (Korea Information Security Agency) as a
501 It is a 16 round block cipher with the key size of 128 bit.
528 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
541 The input, output, and key of SMS4 are each 128 bits.
554 Tiny Encryption Algorithm is a simple cipher that uses
558 Xtendend Tiny Encryption Algorithm is a modification to
559 the TEA algorithm to address a potential key weakness
562 Xtendend Encryption Tiny Algorithm is a mis-implementation
573 candidate cipher by researchers at CounterPane Systems. It is a
574 16 round block cipher supporting key sizes of 128, 192, and 256
603 the AES-256 block cipher on a single 16-byte block. On CPUs
608 underlying stream and block ciphers, subject to a security
609 bound. Unlike XTS, Adiantum is a true wide-block encryption
623 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
635 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
655 CBC (Cipher Block Chaining) mode (NIST SP800-38A)
664 CTR (Counter) mode (NIST SP800-38A)
672 Addendum to SP800-38A (October 2010))
682 ECB (Electronic Codebook) mode (NIST SP800-38A)
692 A mode for storage encryption that is efficient on processors with
708 A tweakable, non malleable, non movable
711 The first 128, 192 or 256 bits in the key are used for AES and the
732 This blockcipher mode is a variant of CTR mode using XORs and little-endian
747 implementation currently can't handle a sectorsize which is not a
755 tristate "AEGIS-128"
759 AEGIS-128 AEAD algorithm
762 bool "AEGIS-128 (arm NEON, arm64 NEON)"
766 AEGIS-128 AEAD algorithm
815 This IV generator generates an IV based on a sequence number by
816 xoring it with a salt. This algorithm is mainly useful for CTR.
827 a sequence number xored with a salt. This is the default
838 symmetric key for a block encryption pass applied to the input
842 This driver implements a crypto API template that can be
854 building for a particular system that requires it (e.g., when
937 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
938 to be used as a secure replacement for the 128-bit hash functions
940 (not to be confused with RIPEMD-128).
1050 A 32-bit CRC (cyclic redundancy check) with a polynomial defined
1138 tristate "NIST SP800-90A DRBG (Deterministic Random Bit Generator)"
1140 DRBG (Deterministic Random Bit Generator) (NIST SP800-90A)
1156 Hash_DRBG variant as defined in NIST SP800-90A.
1164 CTR_DRBG variant as defined in NIST SP800-90A.
1183 A non-physical non-deterministic ("true") RNG (e.g., an entropy source
1184 compliant with NIST SP800-90B) intended to provide a seed to a
1200 size fits into a cache (e.g. L1), only the memory access timing
1206 L1 + L2 + L3. Thus, by selecting a different memory size,
1213 bool "128 kBytes"
1242 The Jitter RNG operation requires a fixed amount of timing
1248 the timer is coarse) by setting the OSR to a higher value. The
1255 The test interface allows a privileged process to capture