{"id":402174,"date":"2024-10-20T04:59:55","date_gmt":"2024-10-20T04:59:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-18033-72022\/"},"modified":"2024-10-26T08:52:23","modified_gmt":"2024-10-26T08:52:23","slug":"bs-iso-iec-18033-72022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-18033-72022\/","title":{"rendered":"BS ISO\/IEC 18033-7:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Requirements on the usage of tweakable block ciphers 6 Deoxys-TBC 6.1 Deoxys-TBC versions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2 Deoxys-TBC encryption <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3 Deoxys-TBC decryption <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.4 Deoxys-TBC tweakey schedule <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7 Skinny 7.1 Skinny versions <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.2 Skinny encryption <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.3 Skinny decryption <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.4 Skinny tweakey schedule <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex A (informative) Numerical examples <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Encryption algorithms – Tweakable block ciphers<\/b><\/p>\n |