Cipher

Results: 21539



#Item
1Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:47:48
2Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
3Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
4Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: www.cryptme.in

Language: English - Date: 2018-07-09 04:03:14
    5LNCSCryptanalysis of the “Kindle” Cipher

    LNCSCryptanalysis of the “Kindle” Cipher

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2013-09-17 06:26:54
      6Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

      Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

      Add to Reading List

      Source URL: skew2011.mat.dtu.dk

      Language: English - Date: 2011-02-07 09:16:03
        7Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

        Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

        Add to Reading List

        Source URL: courses.engr.illinois.edu

        Language: English - Date: 2016-02-02 12:14:19
        8Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

        Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

        Add to Reading List

        Source URL: www.rocq.inria.fr

        Language: English - Date: 2006-03-23 04:05:26
          9Improved Linear Cryptanalysis of SMS4 Block Cipher

          Improved Linear Cryptanalysis of SMS4 Block Cipher

          Add to Reading List

          Source URL: skew2011.mat.dtu.dk

          Language: English - Date: 2011-02-17 05:38:50
            10ACORN v2 A Lightweight Authenticated Cipher Hongjun Wu Nanyang Technological University

            ACORN v2 A Lightweight Authenticated Cipher Hongjun Wu Nanyang Technological University

            Add to Reading List

            Source URL: www1.spms.ntu.edu.sg

            Language: English - Date: 2015-10-04 23:56:13