Attack time

Results: 284



#Item
271Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
272Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

644 IEEE

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
273Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
274Cipher / Key size / Key / Encryption software / Symmetric-key algorithm / One-time pad / Brute-force attack / Export of cryptography in the United States / Encryption / Cryptography / Key management / Public-key cryptography

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
275Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
276Correlation attack / Linear feedback shift register / Weak key / Trivium / MICKEY / One-time pad / SOBER / Crypto-1 / Stream ciphers / Cryptography / Grain

A New Version of Grain-128 with Authentication Martin ˚ Agren1 , Martin Hell1 , Thomas Johansson1 , and Willi Meier2

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-02-07 09:17:31
277Grain / RC4 / Phelix / One-time pad / Py / Cipher / Advantage / Block cipher / Rabbit / Stream ciphers / Cryptography / Keystream

Attack the Dragon H˚ akan Englund and Alexander Maximov

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 05:17:45
278Ciphertext / One-time pad / Chosen-plaintext attack / Gilbert Vernam / Cryptanalysis / Cipher / Vigenère cipher / Ciphertext stealing / Cryptography / Stream ciphers / Keystream

A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis

Add to Reading List

Source URL: csis.bits-pilani.ac.in

Language: English - Date: 2008-05-21 02:03:20
279Substitution cipher / Chosen-plaintext attack / Cryptanalysis / Plaintext / Cipher / Frequency analysis / Data Encryption Standard / Initialization vector / One-time pad / Cryptography / Espionage / Ciphertext

397 PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3, MARCH 1979

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:07
280Internet privacy / Internet protocols / Internet standards / Domain name system / Proxy server / Network Time Protocol / Server / Denial-of-service attack / Hypertext Transfer Protocol / Computing / Internet / World Wide Web

PDF Document

Add to Reading List

Source URL: www.maths.tcd.ie

Language: English - Date: 2006-03-17 14:21:26
UPDATE