Ciphers

Results: 800



#Item
241Social engineering / Antivirus software / Computer crimes / Password / Two-factor authentication / Zeus / LastPass Password Manager / Man-in-the-browser / Phishing / Malware / Software / System software

THE BANKING MALWARE MESS A Ciphers By Ritter Page Terry Ritter A = ritter B = ciphersby

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2010-11-22 14:36:21
242Pseudorandom number generator / Stream ciphers / MUGI / Panama

MUGI Pseudorandom Number Generator Specification Ver. 1.2 Hitachi, Ltd.

Add to Reading List

Source URL: www.hitachi.co.jp

Language: English - Date: 2015-04-05 21:00:45
243Linear feedback shift register / Cipher / Maths24 / Cryptography / Stream ciphers / A5/1

Heraclitus A LFSR based Stream Cipher with Key Dependent Structure Bernard Colbert Deakin University

Add to Reading List

Source URL: members.ozemail.com.au

Language: English - Date: 2011-02-16 21:05:29
244Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.co.jp

Language: English - Date: 2015-04-05 21:00:45
245Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-11-03 20:44:47
246Cryptanalysis / Ciphertext / Known-plaintext attack / Caesar cipher / Cipher / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

Supporting Online Problem-Solving Communities with the Semantic Web Anupriya Ankolekar University of Karlsruhe Katia Sycara

Add to Reading List

Source URL: www2006.org

Language: English - Date: 2006-09-05 12:42:59
247Cryptanalysis / Ciphertext / Known-plaintext attack / Caesar cipher / Cipher / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 21, 2014 Homework 1: Threat Modeling and Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
248Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
249Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
250Block ciphers / Reconfigurable computing / AES implementations / DEAL / Field-programmable gate array / LEX / Xilinx / KHAZAD / Cryptography / Advanced Encryption Standard / Data Encryption Standard

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:09:55
UPDATE