111![](https://www.pdfsearch.io/img/1c08d97a492e473224c2f89614aa9222.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2014-06-09 15:42:02
|
---|
112![NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions](https://www.pdfsearch.io/img/004b288523c88460ca7fd011764e6d3b.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-04-25 15:06:47
|
---|
113![EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features](https://www.pdfsearch.io/img/1b8c7aef6056b03a88ede422e0c34a0b.jpg) | Add to Reading ListSource URL: www.etsi.orgLanguage: English - Date: 2013-08-27 07:30:01
|
---|
114![EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security](https://www.pdfsearch.io/img/5ce7b5da4f0a73b3c215d08b8a9f7a0a.jpg) | Add to Reading ListSource URL: www.etsi.orgLanguage: English - Date: 2012-09-20 09:48:15
|
---|
115![A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed] A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]](https://www.pdfsearch.io/img/f0d59a93f6eb72e4725645148391a8ca.jpg) | Add to Reading ListSource URL: www.mjos.fiLanguage: English - Date: 2013-01-05 09:33:40
|
---|
116![Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover](https://www.pdfsearch.io/img/e5e257c192a48a07242d010957473866.jpg) | Add to Reading ListSource URL: www.mjos.fiLanguage: English - Date: 2013-03-11 21:14:42
|
---|
117![Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin <e tews,weinmann,[removed]> Technische Universit¨ at Darmstadt, Fachbereich Informatik Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin <e tews,weinmann,[removed]> Technische Universit¨ at Darmstadt, Fachbereich Informatik](https://www.pdfsearch.io/img/0241d482f6eec7ac6b0c1c6cb47ad56d.jpg) | Add to Reading ListSource URL: www.impic.orgLanguage: English - Date: 2007-04-03 09:43:48
|
---|
118![Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed] Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]](https://www.pdfsearch.io/img/4ce9fe247bbe2be84ea17a1b4713eca9.jpg) | Add to Reading ListSource URL: www.mjos.fiLanguage: English - Date: 2013-12-12 12:39:16
|
---|
119![Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed] Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]](https://www.pdfsearch.io/img/62a1d286f82c57c3958afa5ebb883ec1.jpg) | Add to Reading ListSource URL: www.impic.orgLanguage: English - Date: 2006-05-30 13:26:34
|
---|
120![Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2 Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2](https://www.pdfsearch.io/img/0b9dd53577b97c8ea20a34443abf9271.jpg) | Add to Reading ListSource URL: www.simonfischer.chLanguage: English - Date: 2008-03-14 07:55:04
|
---|