Ciphers

Results: 800



#Item
231Colossus computer / Cipher / Stream ciphers / Classical cipher / ADFGVX cipher / Cryptography / Bletchley Park / Lorenz cipher

PDF Document

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2008-02-19 10:22:23
232GSM / Cipher / Cryptanalysis / A5/2 / KASUMI / Index of cryptography articles / Cryptography / Stream ciphers / A5/1

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:27
233Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 14:40:46
234Universal Mobile Telecommunications System / Stream ciphers / SNOW / 3GPP / European Telecommunications Standards Institute / Algorithm / System Architecture Evolution / GSM / Advanced Encryption Standard / Software-defined radio / Cryptography / Internet Protocol

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:55
235Cipher / Cryptanalysis / Symmetric-key algorithm / RC4 / Encryption software / Index of cryptography articles / Differential cryptanalysis / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
236A5/1 / GSM / SMS / Keystream / Um interface / IMSI-catcher / Stream ciphers / Technology / Mobile technology

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:32
237Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
238Feistel cipher / Combinatorics / ICE / ARIA / Permutations / Data Encryption Standard / Format-preserving encryption / Cryptography / Block ciphers / Mathematics

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
239Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
240Ciphertext / Caesar cipher / Known-plaintext attack / Cryptanalysis / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-01-19 20:59:56
UPDATE