Initialization vector

Results: 165



#Item
111

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-09 15:42:02
112NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:06:47
113EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-08-27 07:30:01
114EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

EN[removed]V1[removed]Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-20 09:48:15
115A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
116Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed]  Abstract. We present attacks on full Hummingbird-2 which are able to recover

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
117Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin <e tews,weinmann,[removed]> Technische Universit¨ at Darmstadt, Fachbereich Informatik

Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin Technische Universit¨ at Darmstadt, Fachbereich Informatik

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2007-04-03 09:43:48
118Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:16
119Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
120Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04