Advanced Encryption Standard (AES)
AddRoundKey
AES-128
8-bit byte
block size
encryption and decryption process
key expansion
MixColumns
NIST
processing steps
round function
ShiftRows
state array
state words
SubBytes
substitution-permutation network
Application Binary Interface (ABI)
Asymmetric key cryptography
App stores
authentication
code examples
confidentiality
digital signatures
DSA
ECC
SeeElliptic curve cryptography (ECC
ECDSA
private key
public key
RSA algorithm
encryption/decryption
generation of key pairs
modular arithmetic
vs.
symmetric key cryptography
text message, Alice to Bob
Autonomous Decentralized Peer-To-Peer Telemetry (ADEPT)