Ciphers

Results: 800



#Item
131ESTREAM / Linear feedback shift register / SNOW / Keystream / Stream ciphers / Cryptography / SOSEMANUK

Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:30
132RC4 / Initialization vector / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Py

How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-01-22 11:51:20
133Keystream / Advanced Encryption Standard / ESTREAM / Trivium / RC4 / Stream ciphers / Cryptography / Hermes8

Cryptanalysis of Hermes8F Steve Babbage1 , Carlos Cid2 , Norbert Pramstaller3 and Håvard Raddum4 4 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-08-13 05:59:44
134MULTI-S01 / Linear feedback shift register / Symmetric-key algorithm / Block cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Finite fields / Stream ciphers

A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:45
135Algebra / Cryptography / Functional analysis / Generalized functions / Grain / Keystream / Correlation attack / Recurrence relation / Linear feedback shift register / Mathematics / Mathematical analysis / Stream ciphers

Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 10:29:32
136Electronics / Field-programmable gate array / VEST / ESTREAM / Algorithm / Throughput / Application-specific integrated circuit / Achterbahn / Hardware description language / Stream ciphers / Cryptography / Electronic engineering

Recommendations for Hardware Evaluation of Cryptographic Algorithms Frank K. Gürkaynak, Peter Luethi Integrated Systems Laboratory, ETH Zurich CH-8092 Switzerland Abstract. At the SASC 2006 three papers on hardware impl

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-17 04:36:19
137Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2011-06-21 07:45:42
138Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
139Trivium / Linear cryptanalysis / Differential cryptanalysis / Stream ciphers / Grain / Cube attack

Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-20 11:59:02
140Salsa20 / SOSEMANUK / Grain / VEST / Trivium / MICKEY / Achterbahn / Py / Rabbit / Stream ciphers / Cryptography / ESTREAM

Which eSTREAM ciphers have been broken? Daniel J. Bernstein ? Department of Mathematics, Statistics, and Computer Science (M/C 249)

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-03-30 19:39:01
UPDATE