-/** \mainpage Documentation for microcrypt-lib
+/** \mainpage Documentation for AVR-Crypto-Lib
\section Algorithms Available algorithms
\subsection Stream-ciphers Stream ciphers
A stream cipher generates a keystream which is normaly XORed with the
- MD5 (md5.h)
- SHA-1 (sha1.h)
- SHA-256 (sha256.h)
+ - Blake
+ - Blue Midnight Wish
+ - Grøstl
+ - Keccak
+ - Shabal
+ - Skein
+ - Twister
\subsection MACs Message-Authentification-Codes (MACs)
Message-Authentification-Codes work like hash function but take an additional
Implemented MAC functions:
- HMAC-SHA-1 (hmac-sha1.h)
- HMAC-SHA-256 (hmac-sha256.h)
+
\subsection PRNGs Pseudo-Random-Number-Generators (PRNGs)
PRNGs produce pseudo random output determinated by the input. They aim to
Implemented PRNGs:
- Entropium (entropium.h)
-*/
\ No newline at end of file
+*/