Ciphers

Results: 800



#Item
331Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
332Classical cipher / ADFGVX cipher / Permutations / Transposition cipher / Cipher

MEP: Codes and Ciphers, UNIT 11 Transposition Pupil Text 11 Transposition One method of encrypting messages is called transposition. A message, for example,

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 12:59:42
333Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-04-08 23:59:34
3343GPP / A5/1 / Linear feedback shift register / SNOW / Algorithm / Cryptography / Stream ciphers / Mathematics

xxx Algorithm Specification

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:54
335Camellia / Twofish / ICE / Key whitening / Matrix / Feistel / Cryptography / Block ciphers / Feistel cipher

The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
336Puppy Linux / Cryptographic software / Firefox / LastPass Password Manager / Malware / Password manager / Password / Linux distribution / Live CD / Software / Live USB / Portable software

PC SECURITY FOR BANKING A Ciphers By Ritter Page Terry Ritter A = ritter B = ciphersby

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2010-08-03 08:41:59
337Technology / Stream ciphers / KASUMI / A5/1 / 3GPP / GSM / MISTY1 / Enhanced Data Rates for GSM Evolution / General Packet Radio Service / Cryptography / Videotelephony / Electronic engineering

Microsoft Word - design_evaluation_report.doc

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:53
338Malware / Password manager / Rootkit / Password / Computer virus / Firefox / Macintosh / Internet security / Linux malware / Software / System software / Antivirus software

Simplified PC Security Terry Ritter A Ciphers By Ritter Page 2009 December 2 INTRODUCTION Personal Computing has changed from being merely fun and useful to being important and necessary for many people. As we

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2010-08-03 08:41:59
339University of Cambridge Computer Laboratory / Advanced Encryption Standard / 64-bit / International Data Encryption Algorithm / Cryptography / Block ciphers / Tiny Encryption Algorithm

Very Compact Hardware Implementations of the Blockcipher CLEFIA Toru Akishita and Harunaga Hiwatari Sony Corporation {Toru.Akishita,Harunaga.Hiwatari}@jp.sony.com

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-06-14 23:29:05
340A5/1 / 3GPP / GSM / ICE / Cryptography / Stream ciphers / KASUMI

3GPP TSV6Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security;

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:53
UPDATE