David Bruce

Results: 317



#Item
71Sonar / Halibut / Acoustic tag / IPHC / International Pacific Halibut Commission / Pacific Ocean Shelf Tracking Project / Acoustic release / Fish / Pleuronectidae / Pacific halibut

Range test for a deepwater acoutic tag listening array Timothy Loher, Bruce M. Leaman, and Steven R. Hare International Pacific Halibut Commission David W. Carlile and Cleo K. Brylinski Alaska Department of Fish and Game

Add to Reading List

Source URL: www.iphc.washington.edu

Language: English - Date: 2010-11-11 18:59:43
72Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
73ICE / Ciphertext / Stream cipher / Chosen-plaintext attack / Blowfish / Cryptanalysis / Linear cryptanalysis / Cipher / Symmetric-key algorithm / Cryptography / Block cipher / Differential cryptanalysis

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
74Cryptanalysis / Chosen-plaintext attack / Ciphertext / Advantage / Stream ciphers / Cryptography / Cellular Message Encryption Algorithm / Substitution cipher

Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
75Differential-linear attack / Key schedule / Block cipher / Crypt / Data Encryption Standard / SHACAL / Cryptography / Differential cryptanalysis / ICE

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
76Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
77Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
78Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
79Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
80Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
UPDATE