Home | History | Annotate | Download | only in libtomcrypt

Lines Matching defs:Usage

169 usage of the library.
1649 \subsubsection{Example Usage}
1650 The following is an example usage of how to use GCM over multiple packets with a shared secret key.
1900 Note the usage of \textbf{MAXBLOCKSIZE}. In LibTomCrypt, no symmetric block, key or hash digest is larger than \textbf{MAXBLOCKSIZE} in
2579 \subsection{Usage Notice}
2848 \hline \textbf{Name} & \textbf{Descriptor} & \textbf{Usage} \\
2870 usage. It is faster than the default implementation of Yarrow\footnote{Yarrow has been implemented
2913 Since SOBER-128 has a fixed keying scheme, and is very fast (faster than RC4) the ideal usage of SOBER-128 is to
2917 \subsubsection{Example Usage}
2988 platform where the RNG does not work well. Example usage of this function is given below:
3647 value the faster the algorithm will be but the more memory it will take. The memory usage is $3 \cdot 2^{FP\_LUT}$ integers which by default
3648 with TFM amounts to about 400kB of memory. Tuning TFM (by changing FP\_SIZE) can decrease the usage by a fair amount. Memory is only used by a cache entry
3659 ECC--256 you will only need 576 bits, which would reduce the memory usage by 700\%.
3851 but it is very similar. It has been extended by using an ASN.1 sequence and hash object identifiers to allow portable usage. The following function
4197 It will assign to the \textit{index}th position in the \textit{list} the triplet (Type, Data, Size). An example usage would be:
4354 This example encodes a SEQUENCE with two IA5 STRING types containing ``Hello'' and `` World!'' respectively. Note the usage of the \textbf{UL} modifier