<--- Back to Details
First PageDocument Content
Keystream / RC4 / Scream / Block cipher / Pseudorandom number generator / Feistel cipher / KFB mode / Index of cryptography articles / Stream ciphers / Cryptography / QUAD
Date: 2009-09-02 11:51:02
Keystream
RC4
Scream
Block cipher
Pseudorandom number generator
Feistel cipher
KFB mode
Index of cryptography articles
Stream ciphers
Cryptography
QUAD

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Download Document from Source Website

File Size: 308,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

DocID: 1qY1X - View Document

Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

DocID: 1q88i - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document