About 2,270 results
Open links in new tab
  1. The Twofish Encryption Algorithm - Dr. Dobb's

    Dec 1, 1998 · The Twofish Encryption Algorithm. By Bruce Schneier, December 01, 1998. The Twofish encryption algorithm was designed to become the Advanced Encryption Standard (AES), the yet-to-be-determined standard encryption algorithm to replace DES. Bruce lays out the algorithm, then discusses the AES and other encryption candidates.

  2. The Fastest Sorting Algorithm? - Dr. Dobb's

    Apr 1, 2000 · No one knows. We only know that it can't possibly be done using less than n operations: An algorithm using fewer operations than that can't look at each of the n numbers and, therefore, might leave some of the numbers out of order. Even though the n log log n time-sorting algorithm came about as a theoretical game, its real-life performance is ...

  3. Conversations: Al-Go-Rithms | Dr Dobb's

    Oct 1, 2001 · Conversations: Al-Go-Rithms . By Jim Hyslop and Herb Sutter, October 01, 2001 The Standard C library contains some functions that are still useful in C++.

  4. The HMAC Algorithm - Dr Dobb's

    Apr 1, 1999 · The HMAC Algorithm. By William Stallings, April 01, 1999. The Message Authentication Code (MAC) is a widely used technique for performing message authentication. HMAC (short for "keyed-Hashing for Message Authentication"), a variation on the MAC algorithm, has emerged as an Internet standard for a variety of applications.

  5. Algorithm Alley: Unbiasing Random Bits | Dr Dobb's

    Apr 1, 2002 · Algorithm Alley: Unbiasing Random Bits. By Michael Mitzenmacher, April 01, 2002 Efficiently extracting random bits from a possibly biased source of bits.

  6. Programming Public Key CryptoStreams, Part 2 | Dr Dobb's

    Feb 6, 2004 · In this newsletter, I’ll show a C# example that applies the RSA public key encryption algorithm to the task of file encryption using IO streams. The C# source code download associated with this article shows the application code necessary to apply the RSA public key encryption algorithm to the task of file encryption using IO streams.

  7. Attack Trees - Dr. Dobb's

    Dec 1, 1999 · Bruce is the CTO of Counterpane Internet Security, author of Applied Cryptography, Second Edition (John Wiley & Sons, 1995), and inventor of the Blowfish and Twofish encryption algorithms.

  8. The Blowfish Encryption Algorithm: One Year Later | Dr Dobb's

    The Blowfish Encryption Algorithm: One Year Later. By Bruce Schneier, September 01, 1995 Just over a year ago, Bruce presented Blowfish, a block-cipher approach to encryption, and challenged you to break it.

  9. Algorithm Alley - Dr Dobb's

    Dec 1, 1998 · Algorithm Alley. By Bart Preneel, Vincent Rijmen and and Antoon Bosselaers, December 01, 1998. The design of secure cryptographic primitives that achieve high software performance is a challenging problem. Our authors compare different approaches and their performance in software.

  10. MMPC: An Algorithm for Encrypting Multiple Messages

    MMPC: An Algorithm for Encrypting Multiple Messages. By Jim Shapiro and David Shapiro, December 01, 1999. To encrypt multiple messages in one transmission, Jim and David implement Ron Rivest's chaffing and package transform. Their technique is optimized to minimize memory usage, while making as few passes through the data as possible.

Refresh