Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:designedBy |
gptkb:Daniel_J._Bernstein
|
gptkbp:energyEfficiency |
short messages
|
https://www.w3.org/2000/01/rdf-schema#label |
Poly1305
|
gptkbp:isA |
MAC_algorithm
|
gptkbp:isBasedOn |
modular arithmetic
finite field arithmetic |
gptkbp:isCompatibleWith |
various operating systems
ChaCha20 symmetric key algorithms |
gptkbp:isConsidered |
a_lightweight_MAC
a_modern_MAC |
gptkbp:isDesignedFor |
authenticate messages
|
gptkbp:isEvaluatedBy |
performance metrics
security compliance cryptanalysis |
gptkbp:isFoundIn |
HMAC
|
gptkbp:isLocatedIn |
various programming languages
hardware security modules |
gptkbp:isNotableFor |
asymmetric encryption
streaming applications |
gptkbp:isOftenMadeWith |
symmetric encryption algorithms
|
gptkbp:isOptimizedFor |
high performance
|
gptkbp:isPartOf |
cryptographic standards
modern cryptography encryption protocols cryptographic libraries data protection strategies secure software development practices network security frameworks |
gptkbp:isRecognizedFor |
secure communications
cryptographic experts |
gptkbp:isSuitableFor |
high-speed networks
|
gptkbp:isTrainedIn |
various attack vectors
|
gptkbp:isUsedBy |
gptkb:Google_Chrome
OpenSSL libsodium |
gptkbp:isUsedIn |
VPNs
blockchain technology digital signatures cryptographic protocols cloud security solutions IoT security solutions secure messaging applications file integrity checks |
gptkbp:isVulnerableTo |
collision attacks
length extension attacks |
gptkbp:provides |
data authenticity
message integrity |
gptkbp:publishedIn |
2005
|
gptkbp:security |
forgery attacks
|
gptkbp:usedIn |
gptkb:IPsec
TLS SSH |