Misplaced Pages

SSS (cipher)

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Stream cypher algorithm
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
The topic of this article may not meet Misplaced Pages's general notability guideline. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.
Find sources: "SSS" cipher – news · newspapers · books · scholar · JSTOR (October 2021) (Learn how and when to remove this message)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "SSS" cipher – news · newspapers · books · scholar · JSTOR (October 2021) (Learn how and when to remove this message)
(Learn how and when to remove this message)

In cryptography, SSS is a stream cypher algorithm developed by Gregory Rose, Philip Hawkes, Michael Paddon, and Miriam Wiggers de Vries. It includes a message authentication code feature. It has been submitted to the eSTREAM Project of the eCRYPT network. It has not selected for focus nor for consideration during Phase 2; it has been 'archived'.

References

  1. Gregory Rose; Philip Hawkes; Michael Paddon; Miriam Wiggers de Vries. "Primitive Specification for SSS" (PDF). www.ecrypt.eu.org. Archived (PDF) from the original on 15 April 2012. Retrieved 31 October 2021.
Cryptographic hash functions and message authentication codes
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
Stream ciphers
Widely used ciphers
eSTREAM Portfolio
Software
Hardware
Other ciphers
Generators
Theory
Attacks
Cryptography
General
Mathematics


Stub icon

This cryptography-related article is a stub. You can help Misplaced Pages by expanding it.

Categories: