KFB mode

Results: 12



#Item
1ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

Add to Reading List

Source URL: srtp.sourceforge.net

Language: English - Date: 2004-08-16 14:34:48
2Stream Ciphers for Constrained Environments  Meltem S¨ onmez Turan National Institute of Standards and Technology

Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:25:02
3##############################################################  Block Cipher Modes of Operation Output FeedBack (OFB) IV is[removed][removed]08090A0B 0C0D0E0F

############################################################## Block Cipher Modes of Operation Output FeedBack (OFB) IV is[removed][removed]08090A0B 0C0D0E0F

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:32:18
4##############################################################  Block Cipher Modes of Operation Output Feedback (OFB) ############################################################## OFB-TDES (Encryption)

############################################################## Block Cipher Modes of Operation Output Feedback (OFB) ############################################################## OFB-TDES (Encryption)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 13:46:16
5Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2000-10-19 13:37:14
6Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3

Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:22:00
7Comments on \Theory and Applications of Cellular Automata in Cryptography

Comments on \Theory and Applications of Cellular Automata in Cryptography" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K. June 26, 199

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:58
8University of Salzburg, February 2, 2007  Design and Recent Analysis of eSTREAM Candidates Willi Meier

University of Salzburg, February 2, 2007 Design and Recent Analysis of eSTREAM Candidates Willi Meier

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
9On the Security of IV Dependent Stream Ciphers

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
10On the Security of IV Dependent Stream Ciphers

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:04:49