Ciphers

Results: 800



#Item
411Fault injection / Grain / Trivium / Fault / Stream ciphers / Geology / Keystream

Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Prakash Dey1 , Abhishek Chakraborty2 , Avishek Adhikari1 and Debdeep Mukhopadhyay2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 07:21:10
412Linear feedback shift register / Cube attack / Differential cryptanalysis / Key schedule / Trivium / Cryptography / Stream ciphers / Grain

Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-26 18:35:08
413ASCII / Cipher / Notation / Information theory / Mathematics / Cryptography / Huffman coding / Code

Mathematics Enhancement Programme Codes and Ciphers UNIT 17 Huffman Codes

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 13:01:05
414Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
415Stream ciphers / Amateur radio / Telegraphy / One-time pad / Cryptography / Code / Public-key cryptography

Thursday: Prime Number Codes! Survivor Series For Year 5 and Year 6 students

Add to Reading List

Source URL: www.mathsweek.org.nz

Language: English - Date: 2014-08-08 01:15:30
416Arithmetic coding / Hexadecimal / Binary star / Mathematics / Binary / Numeral systems / Computer arithmetic / Data types / Binary numeral system / Binary arithmetic / Linguistics / Lexicology

Mathematics Enhancement Programme Codes and Ciphers UNIT 18 Arithmetic Coding

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 13:01:11
417Stream ciphers / 3GPP / A5/1 / GSM / KASUMI / User equipment / European Telecommunications Standards Institute / 3GP and 3G2 / Algorithm / Cryptography / Technology / Mobile technology

Page 3 of 3 Page 1 of 3 RESTRICTED USAGE UNDERTAKING relating to the A5/3 Algorithm. Between

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-18 12:08:03
418Notation / Theoretical computer science / Hamming / Code / Hamming code / AN codes / Coding theory / Error detection and correction / Mathematics

Mathematics Enhancement Programme Codes and Ciphers

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 13:01:40
419Stream ciphers / A5/1 / 3GPP / GSM / KASUMI / European Telecommunications Standards Institute / User equipment / 3GP and 3G2 / General Packet Radio Service / Cryptography / Technology / Mobile technology

RESTRICTED USAGE UNDERTAKING relating to the A5/4 Algorithm.

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-18 12:08:04
420Binary arithmetic / Field theory / Primitive polynomial / Stream ciphers / Linear feedback shift register / Pseudorandom number generators / Mathematics / Polynomials

TUGboat, Volume[removed]), No. 1 to show off. And reader contributions for this column are still welcome! o Victor Eijkhout Department of Computer Science University of Tennessee at

Add to Reading List

Source URL: tug.org

Language: English - Date: 2011-10-16 21:01:40
UPDATE