Correlation attack

Results: 76



#Item
31A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software ? Makoto Matsumoto1 , Mutsuo Saito2 , Takuji Nishimura3 , and Mariko Hagita4 1

A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software ? Makoto Matsumoto1 , Mutsuo Saito2 , Takuji Nishimura3 , and Mariko Hagita4 1

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2007-08-28 21:10:21
32Fisheries Occasional Publication No. 109, 2012  A correlation study of the potential risk factors associated with white shark attacks in Western Australian waters

Fisheries Occasional Publication No. 109, 2012 A correlation study of the potential risk factors associated with white shark attacks in Western Australian waters

Add to Reading List

Source URL: www.dpc.wa.gov.au

Language: English - Date: 2014-06-07 01:39:45
33Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
34Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
35Vulnerability Management Solutions are Flawed, Leaving your Enterprise at High Risk The lack of advanced network endpoint correlation in your assessment technology introduces bedlam  December 2014

Vulnerability Management Solutions are Flawed, Leaving your Enterprise at High Risk The lack of advanced network endpoint correlation in your assessment technology introduces bedlam December 2014

Add to Reading List

Source URL: www.ddifrontline.com

Language: English - Date: 2014-12-16 16:32:21
36Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 09:57:44
37On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-14 12:04:50
38Linear Feedback Shift Registers in SAGE Timothy Brian Brock May 16, [removed]random numbers should not be generated by a method chosen at random. - Donald Knuth, The Art of Computer Programming.

Linear Feedback Shift Registers in SAGE Timothy Brian Brock May 16, [removed]random numbers should not be generated by a method chosen at random. - Donald Knuth, The Art of Computer Programming.

Add to Reading List

Source URL: www.rose-hulman.edu

Language: English - Date: 2006-10-02 20:51:03
39DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
40Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56