doc tuning
Karel Miko
6 years ago
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | [% FOREACH v IN urls %] |
114 | =item * L<[%v%]|[%v%]> | |
114 | =item * L<[%v%]> | |
115 | 115 | [% END %] |
116 | 116 | =back |
117 | 117 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | 219 | [% FOREACH v IN urls %] |
220 | =item * L<[%v%]|[%v%]> | |
220 | =item * L<[%v%]> | |
221 | 221 | [% END %] |
222 | 222 | =back |
223 | 223 |
259 | 259 | |
260 | 260 | =item * L<CryptX|CryptX> |
261 | 261 | [% FOREACH v IN urls %] |
262 | =item * L<[%v%]|[%v%]> | |
262 | =item * L<[%v%]> | |
263 | 263 | [% END %] |
264 | 264 | =back |
265 | 265 |
170 | 170 | |
171 | 171 | =over |
172 | 172 | |
173 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
173 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
174 | 174 | |
175 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
175 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
176 | 176 | [% FOREACH v IN urls %] |
177 | =item * L<[%v%]|[%v%]> | |
177 | =item * L<[%v%]> | |
178 | 178 | [% END %] |
179 | 179 | =back |
21 | 21 | warn "STARTED: outdir_l='$outdir_l' outdir_t='$outdir_t'\n"; |
22 | 22 | |
23 | 23 | my %list = ( |
24 | AES => { info=>'Symetric cipher AES (aka Rijndael), key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Advanced_Encryption_Standard'], | |
24 | AES => { info=>'Symetric cipher AES (aka Rijndael), key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Advanced_Encryption_Standard'], | |
25 | 25 | spec_rounds=>0, spec_key=>'XXX-DETERMINED-BY-KEYSIZE' }, |
26 | Anubis => { info=>'Symetric cipher Anubis, key size: 128-320 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Anubis_(cipher)'], | |
26 | Anubis => { info=>'Symetric cipher Anubis, key size: 128-320 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Anubis_(cipher)'], | |
27 | 27 | spec_rounds=>0, spec_key=>'XXX-DETERMINED-BY-KEYSIZE' }, |
28 | Blowfish => { info=>'Symetric cipher Blowfish, key size: 64-448 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Blowfish_(cipher)'], | |
28 | Blowfish => { info=>'Symetric cipher Blowfish, key size: 64-448 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Blowfish_(cipher)'], | |
29 | 29 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
30 | CAST5 => { info=>'Symetric cipher CAST5 (aka CAST-128), key size: 40-128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/CAST-128'], | |
30 | CAST5 => { info=>'Symetric cipher CAST5 (aka CAST-128), key size: 40-128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/CAST-128'], | |
31 | 31 | spec_rounds=>0, spec_key=>'XXX-DETERMINED-BY-KEYSIZE' }, # 12 (<=80bits), 16 (>80bits) |
32 | DES => { info=>'Symetric cipher DES, key size: 64[56] bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Data_Encryption_Standard'], | |
32 | DES => { info=>'Symetric cipher DES, key size: 64[56] bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Data_Encryption_Standard'], | |
33 | 33 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
34 | DES_EDE => { info=>'Symetric cipher DES_EDE (aka Tripple-DES, 3DES), key size: 192[168] bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Triple_DES'], | |
34 | DES_EDE => { info=>'Symetric cipher DES_EDE (aka Tripple-DES, 3DES), key size: 192[168] bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Triple_DES'], | |
35 | 35 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
36 | KASUMI => { info=>'Symetric cipher KASUMI, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/KASUMI_(block_cipher)'], | |
36 | KASUMI => { info=>'Symetric cipher KASUMI, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/KASUMI_(block_cipher)'], | |
37 | 37 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
38 | Khazad => { info=>'Symetric cipher Khazad, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/KHAZAD'], | |
38 | Khazad => { info=>'Symetric cipher Khazad, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/KHAZAD'], | |
39 | 39 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
40 | MULTI2 => { info=>'Symetric cipher MULTI2, key size: 320 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/MULTI2'], | |
40 | MULTI2 => { info=>'Symetric cipher MULTI2, key size: 320 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/MULTI2'], | |
41 | 41 | spec_rounds=>199, spec_key=>'S' x 40 }, # default = 128, no-limits! |
42 | Noekeon => { info=>'Symetric cipher Noekeon, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/NOEKEON'], | |
42 | Noekeon => { info=>'Symetric cipher Noekeon, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/NOEKEON'], | |
43 | 43 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
44 | RC2 => { info=>'Symetric cipher RC2, key size: 40-1024 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/RC2'], | |
44 | RC2 => { info=>'Symetric cipher RC2, key size: 40-1024 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/RC2'], | |
45 | 45 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
46 | RC5 => { info=>'Symetric cipher RC5, key size: 64-1024 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/RC5'], | |
46 | RC5 => { info=>'Symetric cipher RC5, key size: 64-1024 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/RC5'], | |
47 | 47 | spec_rounds=>19, spec_key=>'S' x 100 }, # 12..24 |
48 | RC6 => { info=>'Symetric cipher RC6, key size: 64-1024 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/RC6'], | |
48 | RC6 => { info=>'Symetric cipher RC6, key size: 64-1024 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/RC6'], | |
49 | 49 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
50 | SAFERP => { info=>'Symetric cipher SAFER+, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SAFER'], | |
50 | SAFERP => { info=>'Symetric cipher SAFER+, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SAFER'], | |
51 | 51 | spec_rounds=>0, spec_key=>'XXX-DETERMINED-BY-KEYSIZE' }, |
52 | SAFER_K128 => { info=>'Symetric cipher SAFER_K128, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SAFER'], | |
52 | SAFER_K128 => { info=>'Symetric cipher SAFER_K128, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SAFER'], | |
53 | 53 | spec_rounds=>11, spec_key=>'S' x 16 }, # 6..13 |
54 | SAFER_K64 => { info=>'Symetric cipher SAFER_K64, key size: 64 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SAFER'], | |
54 | SAFER_K64 => { info=>'Symetric cipher SAFER_K64, key size: 64 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SAFER'], | |
55 | 55 | spec_rounds=>9, spec_key=>'S' x 8 }, # 6..13 |
56 | SAFER_SK128 => { info=>'Symetric cipher SAFER_SK128, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SAFER'], | |
56 | SAFER_SK128 => { info=>'Symetric cipher SAFER_SK128, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SAFER'], | |
57 | 57 | spec_rounds=>11, spec_key=>'S' x 16 }, # 6..13 |
58 | SAFER_SK64 => { info=>'Symetric cipher SAFER_SK64, key size: 64 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SAFER'], | |
58 | SAFER_SK64 => { info=>'Symetric cipher SAFER_SK64, key size: 64 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SAFER'], | |
59 | 59 | spec_rounds=>9, spec_key=>'S' x 8 }, # 6..13 |
60 | SEED => { info=>'Symetric cipher SEED, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/SEED'], | |
60 | SEED => { info=>'Symetric cipher SEED, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/SEED'], | |
61 | 61 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
62 | Skipjack => { info=>'Symetric cipher Skipjack, key size: 80 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Skipjack_(cipher)'], | |
62 | Skipjack => { info=>'Symetric cipher Skipjack, key size: 80 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Skipjack_(cipher)'], | |
63 | 63 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
64 | Twofish => { info=>'Symetric cipher Twofish, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Twofish'], | |
64 | Twofish => { info=>'Symetric cipher Twofish, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Twofish'], | |
65 | 65 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
66 | XTEA => { info=>'Symetric cipher XTEA, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/XTEA'], | |
66 | XTEA => { info=>'Symetric cipher XTEA, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/XTEA'], | |
67 | 67 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
68 | Camellia => { info=>'Symetric cipher Camellia, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Camellia_(cipher)'], | |
68 | Camellia => { info=>'Symetric cipher Camellia, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Camellia_(cipher)'], | |
69 | 69 | spec_rounds=>0, spec_key=>'XXX-DETERMINED-BY-KEYSIZE' }, |
70 | IDEA => { info=>'Symetric cipher IDEA, key size: 128 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm'], | |
70 | IDEA => { info=>'Symetric cipher IDEA, key size: 128 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm'], | |
71 | 71 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
72 | Serpent => { info=>'Symetric cipher Serpent, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['http://en.wikipedia.org/wiki/Serpent_(cipher)'], | |
72 | Serpent => { info=>'Symetric cipher Serpent, key size: 128/192/256 bits (Crypt::CBC compliant)', urls=>['https://en.wikipedia.org/wiki/Serpent_(cipher)'], | |
73 | 73 | spec_rounds=>0, spec_key=>'XXX-ROUNDS-FIXED' }, |
74 | 74 | ); |
75 | 75 |
22 | 22 | warn "STARTED: outdir_l='$outdir_l' outdir_t='$outdir_t'\n"; |
23 | 23 | |
24 | 24 | my %list = ( |
25 | CHAES => { ltc=>'chc_hash', info=>'Hash function - CipherHash based on AES [size: 128 bits]', urls=>['http://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers'] }, | |
26 | MD2 => { ltc=>'md2', info=>'Hash function MD2 [size: 128 bits]', urls=>['http://en.wikipedia.org/wiki/MD2_(cryptography)'] }, | |
27 | MD4 => { ltc=>'md4', info=>'Hash function MD4 [size: 128 bits]', urls=>['http://en.wikipedia.org/wiki/MD4'] }, | |
28 | MD5 => { ltc=>'md5', info=>'Hash function MD5 [size: 128 bits]', urls=>['http://en.wikipedia.org/wiki/MD5'] }, | |
29 | RIPEMD128 => { ltc=>'rmd128', info=>'Hash function RIPEMD-128 [size: 128 bits]', urls=>['http://en.wikipedia.org/wiki/RIPEMD'] }, | |
30 | RIPEMD160 => { ltc=>'rmd160', info=>'Hash function RIPEMD-160 [size: 160 bits]', urls=>['http://en.wikipedia.org/wiki/RIPEMD'] }, | |
31 | RIPEMD256 => { ltc=>'rmd256', info=>'Hash function RIPEMD-256 [size: 256 bits]', urls=>['http://en.wikipedia.org/wiki/RIPEMD'] }, | |
32 | RIPEMD320 => { ltc=>'rmd320', info=>'Hash function RIPEMD-320 [size: 320 bits]', urls=>['http://en.wikipedia.org/wiki/RIPEMD'] }, | |
33 | SHA1 => { ltc=>'sha1', info=>'Hash function SHA-1 [size: 160 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-1'] }, | |
34 | SHA224 => { ltc=>'sha224', info=>'Hash function SHA-224 [size: 224 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
35 | SHA256 => { ltc=>'sha256', info=>'Hash function SHA-256 [size: 256 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
36 | SHA384 => { ltc=>'sha384', info=>'Hash function SHA-384 [size: 384 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
37 | SHA512 => { ltc=>'sha512', info=>'Hash function SHA-512 [size: 512 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
38 | SHA512_224 => { ltc=>'sha512_224', info=>'Hash function SHA-512/224 [size: 224 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
39 | SHA512_256 => { ltc=>'sha512_256', info=>'Hash function SHA-512/256 [size: 256 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-2'] }, | |
40 | SHA3_224 => { ltc=>'sha3-224', info=>'Hash function SHA3-224 [size: 224 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-3'] }, | |
41 | SHA3_256 => { ltc=>'sha3-256', info=>'Hash function SHA3-256 [size: 256 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-3'] }, | |
42 | SHA3_384 => { ltc=>'sha3-384', info=>'Hash function SHA3-384 [size: 384 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-3'] }, | |
43 | SHA3_512 => { ltc=>'sha3-512', info=>'Hash function SHA3-512 [size: 512 bits]', urls=>['http://en.wikipedia.org/wiki/SHA-3'] }, | |
44 | Tiger192 => { ltc=>'tiger', info=>'Hash function Tiger-192 [size: 192 bits]', urls=>['http://en.wikipedia.org/wiki/Tiger_(cryptography)'] }, | |
45 | Whirlpool => { ltc=>'whirlpool', info=>'Hash function Whirlpool [size: 512 bits]', urls=>['http://en.wikipedia.org/wiki/Whirlpool_(cryptography)'] }, | |
25 | CHAES => { ltc=>'chc_hash', info=>'Hash function - CipherHash based on AES [size: 128 bits]', urls=>['https://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers'] }, | |
26 | MD2 => { ltc=>'md2', info=>'Hash function MD2 [size: 128 bits]', urls=>['https://en.wikipedia.org/wiki/MD2_(cryptography)'] }, | |
27 | MD4 => { ltc=>'md4', info=>'Hash function MD4 [size: 128 bits]', urls=>['https://en.wikipedia.org/wiki/MD4'] }, | |
28 | MD5 => { ltc=>'md5', info=>'Hash function MD5 [size: 128 bits]', urls=>['https://en.wikipedia.org/wiki/MD5'] }, | |
29 | RIPEMD128 => { ltc=>'rmd128', info=>'Hash function RIPEMD-128 [size: 128 bits]', urls=>['https://en.wikipedia.org/wiki/RIPEMD'] }, | |
30 | RIPEMD160 => { ltc=>'rmd160', info=>'Hash function RIPEMD-160 [size: 160 bits]', urls=>['https://en.wikipedia.org/wiki/RIPEMD'] }, | |
31 | RIPEMD256 => { ltc=>'rmd256', info=>'Hash function RIPEMD-256 [size: 256 bits]', urls=>['https://en.wikipedia.org/wiki/RIPEMD'] }, | |
32 | RIPEMD320 => { ltc=>'rmd320', info=>'Hash function RIPEMD-320 [size: 320 bits]', urls=>['https://en.wikipedia.org/wiki/RIPEMD'] }, | |
33 | SHA1 => { ltc=>'sha1', info=>'Hash function SHA-1 [size: 160 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-1'] }, | |
34 | SHA224 => { ltc=>'sha224', info=>'Hash function SHA-224 [size: 224 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
35 | SHA256 => { ltc=>'sha256', info=>'Hash function SHA-256 [size: 256 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
36 | SHA384 => { ltc=>'sha384', info=>'Hash function SHA-384 [size: 384 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
37 | SHA512 => { ltc=>'sha512', info=>'Hash function SHA-512 [size: 512 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
38 | SHA512_224 => { ltc=>'sha512_224', info=>'Hash function SHA-512/224 [size: 224 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
39 | SHA512_256 => { ltc=>'sha512_256', info=>'Hash function SHA-512/256 [size: 256 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-2'] }, | |
40 | SHA3_224 => { ltc=>'sha3-224', info=>'Hash function SHA3-224 [size: 224 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-3'] }, | |
41 | SHA3_256 => { ltc=>'sha3-256', info=>'Hash function SHA3-256 [size: 256 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-3'] }, | |
42 | SHA3_384 => { ltc=>'sha3-384', info=>'Hash function SHA3-384 [size: 384 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-3'] }, | |
43 | SHA3_512 => { ltc=>'sha3-512', info=>'Hash function SHA3-512 [size: 512 bits]', urls=>['https://en.wikipedia.org/wiki/SHA-3'] }, | |
44 | Tiger192 => { ltc=>'tiger', info=>'Hash function Tiger-192 [size: 192 bits]', urls=>['https://en.wikipedia.org/wiki/Tiger_(cryptography)'] }, | |
45 | Whirlpool => { ltc=>'whirlpool', info=>'Hash function Whirlpool [size: 512 bits]', urls=>['https://en.wikipedia.org/wiki/Whirlpool_(cryptography)'] }, | |
46 | 46 | BLAKE2b_160 => { ltc=>'blake2b-160', info=>'Hash function BLAKE2b [size: 160 bits]', urls=>['https://blake2.net/', 'https://tools.ietf.org/html/rfc7693'] }, |
47 | 47 | BLAKE2b_256 => { ltc=>'blake2b-256', info=>'Hash function BLAKE2b [size: 256 bits]', urls=>['https://blake2.net/', 'https://tools.ietf.org/html/rfc7693'] }, |
48 | 48 | BLAKE2b_384 => { ltc=>'blake2b-384', info=>'Hash function BLAKE2b [size: 384 bits]', urls=>['https://blake2.net/', 'https://tools.ietf.org/html/rfc7693'] }, |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Advanced_Encryption_Standard|http://en.wikipedia.org/wiki/Advanced_Encryption_Standard> | |
114 | =item * L<https://en.wikipedia.org/wiki/Advanced_Encryption_Standard> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Anubis_(cipher)|http://en.wikipedia.org/wiki/Anubis_(cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/Anubis_(cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Blowfish_(cipher)|http://en.wikipedia.org/wiki/Blowfish_(cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/Blowfish_(cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/CAST-128|http://en.wikipedia.org/wiki/CAST-128> | |
114 | =item * L<https://en.wikipedia.org/wiki/CAST-128> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Camellia_(cipher)|http://en.wikipedia.org/wiki/Camellia_(cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/Camellia_(cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Data_Encryption_Standard|http://en.wikipedia.org/wiki/Data_Encryption_Standard> | |
114 | =item * L<https://en.wikipedia.org/wiki/Data_Encryption_Standard> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Triple_DES|http://en.wikipedia.org/wiki/Triple_DES> | |
114 | =item * L<https://en.wikipedia.org/wiki/Triple_DES> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm|http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm> | |
114 | =item * L<https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/KASUMI_(block_cipher)|http://en.wikipedia.org/wiki/KASUMI_(block_cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/KASUMI_(block_cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/KHAZAD|http://en.wikipedia.org/wiki/KHAZAD> | |
114 | =item * L<https://en.wikipedia.org/wiki/KHAZAD> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/MULTI2|http://en.wikipedia.org/wiki/MULTI2> | |
114 | =item * L<https://en.wikipedia.org/wiki/MULTI2> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/NOEKEON|http://en.wikipedia.org/wiki/NOEKEON> | |
114 | =item * L<https://en.wikipedia.org/wiki/NOEKEON> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/RC2|http://en.wikipedia.org/wiki/RC2> | |
114 | =item * L<https://en.wikipedia.org/wiki/RC2> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/RC5|http://en.wikipedia.org/wiki/RC5> | |
114 | =item * L<https://en.wikipedia.org/wiki/RC5> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/RC6|http://en.wikipedia.org/wiki/RC6> | |
114 | =item * L<https://en.wikipedia.org/wiki/RC6> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SAFER|http://en.wikipedia.org/wiki/SAFER> | |
114 | =item * L<https://en.wikipedia.org/wiki/SAFER> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SAFER|http://en.wikipedia.org/wiki/SAFER> | |
114 | =item * L<https://en.wikipedia.org/wiki/SAFER> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SAFER|http://en.wikipedia.org/wiki/SAFER> | |
114 | =item * L<https://en.wikipedia.org/wiki/SAFER> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SAFER|http://en.wikipedia.org/wiki/SAFER> | |
114 | =item * L<https://en.wikipedia.org/wiki/SAFER> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SAFER|http://en.wikipedia.org/wiki/SAFER> | |
114 | =item * L<https://en.wikipedia.org/wiki/SAFER> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/SEED|http://en.wikipedia.org/wiki/SEED> | |
114 | =item * L<https://en.wikipedia.org/wiki/SEED> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Serpent_(cipher)|http://en.wikipedia.org/wiki/Serpent_(cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/Serpent_(cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Skipjack_(cipher)|http://en.wikipedia.org/wiki/Skipjack_(cipher)> | |
114 | =item * L<https://en.wikipedia.org/wiki/Skipjack_(cipher)> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/Twofish|http://en.wikipedia.org/wiki/Twofish> | |
114 | =item * L<https://en.wikipedia.org/wiki/Twofish> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
109 | 109 | |
110 | 110 | =over |
111 | 111 | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
112 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
113 | 113 | |
114 | =item * L<http://en.wikipedia.org/wiki/XTEA|http://en.wikipedia.org/wiki/XTEA> | |
114 | =item * L<https://en.wikipedia.org/wiki/XTEA> | |
115 | 115 | |
116 | 116 | =back |
117 | 117 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/|https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://blake2.net/> | |
221 | ||
222 | =item * L<https://tools.ietf.org/html/rfc7693> | |
223 | 223 | |
224 | 224 | =back |
225 | 225 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers|http://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/MD2_(cryptography)|http://en.wikipedia.org/wiki/MD2_(cryptography)> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/MD2_(cryptography)> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/MD4|http://en.wikipedia.org/wiki/MD4> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/MD4> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/MD5|http://en.wikipedia.org/wiki/MD5> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/MD5> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/RIPEMD|http://en.wikipedia.org/wiki/RIPEMD> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/RIPEMD> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/RIPEMD|http://en.wikipedia.org/wiki/RIPEMD> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/RIPEMD> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/RIPEMD|http://en.wikipedia.org/wiki/RIPEMD> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/RIPEMD> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/RIPEMD|http://en.wikipedia.org/wiki/RIPEMD> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/RIPEMD> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-1|http://en.wikipedia.org/wiki/SHA-1> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-1> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-3|http://en.wikipedia.org/wiki/SHA-3> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-3> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-3|http://en.wikipedia.org/wiki/SHA-3> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-3> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-3|http://en.wikipedia.org/wiki/SHA-3> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-3> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-3|http://en.wikipedia.org/wiki/SHA-3> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-3> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/SHA-2|http://en.wikipedia.org/wiki/SHA-2> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/SHA-2> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/Tiger_(cryptography)|http://en.wikipedia.org/wiki/Tiger_(cryptography)> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/Tiger_(cryptography)> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
215 | 215 | |
216 | 216 | =over |
217 | 217 | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest|Crypt::Digest> | |
219 | ||
220 | =item * L<http://en.wikipedia.org/wiki/Whirlpool_(cryptography)|http://en.wikipedia.org/wiki/Whirlpool_(cryptography)> | |
218 | =item * L<CryptX|CryptX>, L<Crypt::Digest> | |
219 | ||
220 | =item * L<https://en.wikipedia.org/wiki/Whirlpool_(cryptography)> | |
221 | 221 | |
222 | 222 | =back |
223 | 223 |
146 | 146 | |
147 | 147 | =item * L<CryptX|CryptX> |
148 | 148 | |
149 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
149 | =item * L<https://tools.ietf.org/html/rfc7693> | |
150 | 150 | |
151 | 151 | =back |
152 | 152 |
146 | 146 | |
147 | 147 | =item * L<CryptX|CryptX> |
148 | 148 | |
149 | =item * L<https://tools.ietf.org/html/rfc7693|https://tools.ietf.org/html/rfc7693> | |
149 | =item * L<https://tools.ietf.org/html/rfc7693> | |
150 | 150 | |
151 | 151 | =back |
152 | 152 |
148 | 148 | |
149 | 149 | =item * L<CryptX|CryptX> |
150 | 150 | |
151 | =item * L<https://en.wikipedia.org/wiki/Hmac|https://en.wikipedia.org/wiki/Hmac> | |
151 | =item * L<https://en.wikipedia.org/wiki/Hmac> | |
152 | 152 | |
153 | =item * L<https://tools.ietf.org/html/rfc2104|https://tools.ietf.org/html/rfc2104> | |
153 | =item * L<https://tools.ietf.org/html/rfc2104> | |
154 | 154 | |
155 | 155 | =back |
156 | 156 |
148 | 148 | |
149 | 149 | =item * L<CryptX|CryptX> |
150 | 150 | |
151 | =item * L<https://en.wikipedia.org/wiki/OMAC_%28cryptography%29|https://en.wikipedia.org/wiki/OMAC_%28cryptography%29> | |
151 | =item * L<https://en.wikipedia.org/wiki/OMAC_%28cryptography%29> | |
152 | 152 | |
153 | 153 | =back |
154 | 154 |
148 | 148 | |
149 | 149 | =item * L<CryptX|CryptX> |
150 | 150 | |
151 | =item * L<https://en.wikipedia.org/wiki/PMAC_%28cryptography%29|https://en.wikipedia.org/wiki/PMAC_%28cryptography%29> | |
151 | =item * L<https://en.wikipedia.org/wiki/PMAC_%28cryptography%29> | |
152 | 152 | |
153 | 153 | =back |
154 | 154 |
146 | 146 | |
147 | 147 | =item * L<CryptX|CryptX> |
148 | 148 | |
149 | =item * L<http://eprint.iacr.org/2005/088.pdf|http://eprint.iacr.org/2005/088.pdf> | |
149 | =item * L<http://eprint.iacr.org/2005/088.pdf> | |
150 | 150 | |
151 | 151 | =back |
152 | 152 |
146 | 146 | |
147 | 147 | =item * L<CryptX|CryptX> |
148 | 148 | |
149 | =item * L<https://www.ietf.org/rfc/rfc7539.txt|https://www.ietf.org/rfc/rfc7539.txt> | |
149 | =item * L<https://www.ietf.org/rfc/rfc7539.txt> | |
150 | 150 | |
151 | 151 | =back |
152 | 152 |
148 | 148 | |
149 | 149 | =item * L<CryptX|CryptX> |
150 | 150 | |
151 | =item * L<https://www.ietf.org/rfc/rfc3566.txt|https://www.ietf.org/rfc/rfc3566.txt> | |
151 | =item * L<https://www.ietf.org/rfc/rfc3566.txt> | |
152 | 152 | |
153 | 153 | =back |
154 | 154 |
102 | 102 | |
103 | 103 | =over |
104 | 104 | |
105 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
105 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
106 | 106 | |
107 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
107 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
108 | 108 | |
109 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher-block_chaining_.28CBC.29|https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher-block_chaining_.28CBC.29> | |
109 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher-block_chaining_.28CBC.29> | |
110 | 110 | |
111 | 111 | =back |
79 | 79 | |
80 | 80 | =over |
81 | 81 | |
82 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
82 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
83 | 83 | |
84 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
84 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
85 | 85 | |
86 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_.28CFB.29|https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_.28CFB.29> | |
86 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_.28CFB.29> | |
87 | 87 | |
88 | 88 | =back |
86 | 86 | |
87 | 87 | =over |
88 | 88 | |
89 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
89 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
90 | 90 | |
91 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
91 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
92 | 92 | |
93 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29|https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29> | |
93 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29> | |
94 | 94 | |
95 | 95 | =back |
103 | 103 | |
104 | 104 | =over |
105 | 105 | |
106 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
106 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
107 | 107 | |
108 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
108 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
109 | 109 | |
110 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29|https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29> | |
110 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29> | |
111 | 111 | |
112 | 112 | =back |
79 | 79 | |
80 | 80 | =over |
81 | 81 | |
82 | =item * L<CryptX|CryptX>, L<Crypt::Cipher|Crypt::Cipher> | |
82 | =item * L<CryptX|CryptX>, L<Crypt::Cipher> | |
83 | 83 | |
84 | =item * L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... | |
84 | =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... | |
85 | 85 | |
86 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Output_feedback_.28OFB.29|https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Output_feedback_.28OFB.29> | |
86 | =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Output_feedback_.28OFB.29> | |
87 | 87 | |
88 | 88 | =back |