Fluhrer

Results: 41



#Item
31RC4 / Distinguishing attack / Keystream / Weak key / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

The Most Efficient Distinguishing Attack on VMPC and RC4A Yukiyasu Tsunoo1 , Teruo Saito2 , Hiroyasu Kubo2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-08 09:40:27
32Ciphertext / Disk encryption theory / Initialization vector / Galois/Counter Mode / Feistel cipher / Cipher / Ciphertext stealing / Advantage / Cryptography / Block cipher modes of operation / Block cipher

The Extended Codebook (XCB) Mode of Operation David A. McGrew and Scott Fluhrer Cisco Systems, Inc.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-10-25 16:41:00
33RC4 / Fluhrer /  Mantin and Shamir attack / Grain / Stream ciphers / Cryptography / Keystream

Cryptanalysis of Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-07-18 08:11:42
34Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Monitor mode / Cryptography / Wireless networking / Computer network security

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:45:01
35Functional languages / Q / Factorial / Fluhrer /  Mantin and Shamir attack / Mathematics / Cryptography / RC4

Key Collisions of the RC4 Stream Cipher Mitsuru Matsui Information Technology R&D Center

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-04-15 07:57:11
36ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
37IEEE 802.11 / Computer network security / Secure communication / Wired Equivalent Privacy / RC4 / Related-key attack / IEEE 802.11i-2004 / Fluhrer /  Mantin and Shamir attack / CCMP / Cryptography / Wireless networking / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-19 09:22:01
38Pseudorandom number generators / RC4 / Fisher–Yates shuffle / Algorithm / Fluhrer /  Mantin and Shamir attack / Cryptography / Mathematics / Stream ciphers

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
39Wireless networking / Computer network security / Stream ciphers / Wired Equivalent Privacy / Temporal Key Integrity Protocol / RC4 / Fluhrer /  Mantin and Shamir attack / Related-key attack / Wi-Fi Protected Access / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: dl.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:44
40RC4 / Fluhrer /  Mantin and Shamir attack / Related-key attack / Wired Equivalent Privacy / Initialization vector / Weak key / ICE / Permutation / CipherSaber / Cryptography / Stream ciphers / Pseudorandom number generators

Untitled

Add to Reading List

Source URL: aboba.drizzlehosting.com

Language: English - Date: 2001-08-15 23:17:30
UPDATE