Lines Matching full:encryption

254 	  profile.  This is required for Kerberos 5-style encryption, used by
352 tristate "AES (Advanced Encryption Standard)"
370 tristate "AES (Advanced Encryption Standard) (fixed time)"
380 solely on encryption (although decryption is supported as well, but
383 Instead of using 16 lookup tables of 1 KB each, (8 for encryption and
410 ARIA is a standard encryption algorithm of the Republic of Korea.
469 CAST6 (CAST-256) encryption algorithm (RFC2612)
476 DES (Data Encryption Standard)(FIPS 46-2, ISO/IEC 18033-3) and
512 national standard encryption algorithm of the Republic of Korea.
564 TEA (Tiny Encryption Algorithm) cipher algorithms
566 Tiny Encryption Algorithm is a simple cipher that uses
570 Xtendend Tiny Encryption Algorithm is a modification to
574 Xtendend Encryption Tiny Algorithm is a mis-implementation
584 Twofish was submitted as an AES (Advanced Encryption Standard)
609 Adiantum tweakable, length-preserving encryption mode
611 Designed for fast and secure disk encryption, especially on
621 bound. Unlike XTS, Adiantum is a true wide-block encryption
687 for AES encryption.
702 HCTR2 length-preserving encryption mode
704 A mode for storage encryption that is efficient on processors with
770 menu "AEAD (authenticated encryption with associated data) ciphers"
807 authenticated encryption mode (NIST SP800-38C)
816 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC
844 This IV generator generates an IV based on the encryption of
855 dm-crypt. It uses the hash of the block encryption key as the
856 symmetric key for a block encryption pass applied to the input
858 encryption.
862 type of the first template argument), and which defers encryption
875 block encryption)