Fluhrer

Results: 41



#Item
1

Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

Add to Reading List

Source URL: www.rc4nomore.com

- Date: 2018-09-24 16:02:05
    2

    References 1. S. Adam, J. Ioannidis, and A. D. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Technical report, ATT Labs TD-4ZCPZZ, Available at: http://www.cs.rice.edu/~astubble/wep., August.

    Add to Reading List

    Source URL: delta.cs.cinvestav.mx

    - Date: 2007-06-06 11:21:31
      3Cryptography / Stream ciphers / RC4 / Keystream / Fluhrer /  Mantin and Shamir attack / Distinguishing attack

      Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-02-22 02:10:52
      4

      Scalar Blinding on Elliptic Curves with Special Structure Scott Fluhrer Cisco Systems August 11, 2015

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-08-11 15:14:11
        5RC4 / Initialization vector / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Py

        How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2007-01-22 11:51:20
        6RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

        A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

        Add to Reading List

        Source URL: saluc.engr.uconn.edu

        Language: English - Date: 2006-02-21 13:57:34
        7Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

        Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

        Add to Reading List

        Source URL: saluc.engr.uconn.edu

        Language: English - Date: 2006-02-21 14:40:46
        8Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

        Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-04-27 05:15:53
        9Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

        On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

        Add to Reading List

        Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

        Language: English - Date: 2013-09-28 18:46:16
        UPDATE