Lines Matching full:encryption

246 	  profile.  This is required for Kerberos 5-style encryption, used by
348 tristate "AES (Advanced Encryption Standard)"
366 tristate "AES (Advanced Encryption Standard) (fixed time)"
376 solely on encryption (although decryption is supported as well, but
379 Instead of using 16 lookup tables of 1 KB each, (8 for encryption and
406 ARIA is a standard encryption algorithm of the Republic of Korea.
465 CAST6 (CAST-256) encryption algorithm (RFC2612)
472 DES (Data Encryption Standard)(FIPS 46-2, ISO/IEC 18033-3) and
508 national standard encryption algorithm of the Republic of Korea.
560 TEA (Tiny Encryption Algorithm) cipher algorithms
562 Tiny Encryption Algorithm is a simple cipher that uses
566 Xtendend Tiny Encryption Algorithm is a modification to
570 Xtendend Encryption Tiny Algorithm is a mis-implementation
580 Twofish was submitted as an AES (Advanced Encryption Standard)
604 Adiantum tweakable, length-preserving encryption mode
606 Designed for fast and secure disk encryption, especially on
616 bound. Unlike XTS, Adiantum is a true wide-block encryption
683 for AES encryption.
698 HCTR2 length-preserving encryption mode
700 A mode for storage encryption that is efficient on processors with
765 menu "AEAD (authenticated encryption with associated data) ciphers"
802 authenticated encryption mode (NIST SP800-38C)
812 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC
841 This IV generator generates an IV based on the encryption of
852 dm-crypt. It uses the hash of the block encryption key as the
853 symmetric key for a block encryption pass applied to the input
855 encryption.
859 type of the first template argument), and which defers encryption
872 block encryption)