Correlation attack

Results: 76



#Item
31Elementary mathematics / Cryptography / Field theory / Correlation attack / Quasigroup / Stream cipher / Linear feedback shift register / Function / Sequence / Mathematics / Abstract algebra / Pseudorandom number generators

A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software ? Makoto Matsumoto1 , Mutsuo Saito2 , Takuji Nishimura3 , and Mariko Hagita4 1

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2007-08-28 21:10:21
32Shark / Great white shark / Outline of sharks / Sharm el-Sheikh shark attacks / Fish / Sharks / Shark attack

Fisheries Occasional Publication No. 109, 2012 A correlation study of the potential risk factors associated with white shark attacks in Western Australian waters

Add to Reading List

Source URL: www.dpc.wa.gov.au

Language: English - Date: 2014-06-07 01:39:45
33Mathematics / Pseudorandom number generators / Cryptography / Error detection and correction / Correlation attack / Analysis of algorithms / Linear feedback shift register / Stream cipher / Parity bit / Theoretical computer science / Applied mathematics / Binary arithmetic

Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
34Binary arithmetic / Linear feedback shift register / Stream cipher / Self-shrinking generator / Sequence / Computing / Shift register / Correlation attack / Grain / Pseudorandom number generators / Cryptography / Mathematics

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
35Cyberwarfare / Computer network security / Hacking / Vulnerability / Social vulnerability / Information security / VM / Zero-day attack / TRAC / Risk / Security / Computer security

Vulnerability Management Solutions are Flawed, Leaving your Enterprise at High Risk The lack of advanced network endpoint correlation in your assessment technology introduces bedlam December 2014

Add to Reading List

Source URL: www.ddifrontline.com

Language: English - Date: 2014-12-16 16:32:21
36Initialization vector / Cipher / Substitution cipher / WAKE / A5/1 / Keystream / Py / Correlation attack / Grain / Cryptography / Stream ciphers / Block cipher

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 09:57:44
37Boolean algebra / Binary arithmetic / Linear feedback shift register / Stream cipher / Advanced Encryption Standard / Boolean function / Computational complexity theory / Recurrence relation / Correlation attack / Cryptography / Mathematics / Pseudorandom number generators

On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-14 12:04:50
38Stream ciphers / Binary arithmetic / Linear feedback shift register / Berlekamp–Massey algorithm / Pseudorandom binary sequence / Correlation attack / Self-shrinking generator / Cryptography / Pseudorandom number generators / Mathematics

Linear Feedback Shift Registers in SAGE Timothy Brian Brock May 16, [removed]random numbers should not be generated by a method chosen at random. - Donald Knuth, The Art of Computer Programming.

Add to Reading List

Source URL: www.rose-hulman.edu

Language: English - Date: 2006-10-02 20:51:03
39Linear feedback shift register / Self-shrinking generator / Py / ESTREAM / QUAD / Keystream / Grain / Stream ciphers / Cryptography / Correlation attack

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
40Binary arithmetic / Linear feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shift register / Stream ciphers / Cryptography / Pseudorandom number generators

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
UPDATE