Initialization vector

Results: 165



#Item
141ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
142Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
143Substitution cipher / Chosen-plaintext attack / Cryptanalysis / Plaintext / Cipher / Frequency analysis / Data Encryption Standard / Initialization vector / One-time pad / Cryptography / Espionage / Ciphertext

397 PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3, MARCH 1979

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:07
144Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: n-pn.info

Language: English - Date: 2011-11-21 22:49:00
145Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
146Linear feedback shift register / RC4 / SOBER / Initialization vector / Turing / Keystream / Block cipher modes of operation / Weak key / SNOW / Cryptography / Stream ciphers / Correlation attack

PDF Document

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
147IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
148Block cipher / Message authentication codes / Mercy / Initialization vector / Authenticated encryption / Cipher / CBC-MAC / Feistel cipher / Advantage / Cryptography / Block cipher modes of operation / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2003-07-07 17:57:00
149Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
150Differential-linear attack / Initialization vector / Differential cryptanalysis / Linear cryptanalysis / Confusion and diffusion / Z4 / ICE / Normal distribution / Keystream / Cryptography / Stream ciphers / Phelix

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-12-12 15:42:51
UPDATE