Keystream

Results: 169



#Item
91RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
92Keystream / Mathematics / Applied mathematics / Computing / Stream ciphers / Feedback with Carry Shift Registers / F-FCSR

Equivalent Representations of the F-FCSR Keystream Generator[removed]Equivalent Representations of the F-FCSR Keystream Generator

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-02-19 06:05:08
93Keystream / Block cipher / A5/1 / Symmetric-key algorithm / Salsa20 / Caesar cipher / Substitution cipher / RC4 / Cryptography / Stream ciphers / Cipher

Analysis of Lightweight Stream Ciphers PhD public defense Simon Fischer EPFL and FHNW April 18th 2008

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-04-17 18:36:42
94Cryptography / Feedback with Carry Shift Registers / Applied mathematics / F-FCSR / Galois theory / Algebraic number theory / ESTREAM / Linear feedback shift register / Galois module / Stream ciphers / Pseudorandom number generators / Mathematics

Equivalent Representations of the F-FCSR Keystream Generator Simon Fischer1 , Willi Meier1 , and Dirk Stegemann2 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:21:41
95MAG / Stream ciphers / Keystream / Distinguishing attack

Distinguishing Attack on MAG Simon K¨ unzli and Willi Meier FHNW, 5210 Windisch (Switzerland) Abstract. MAG is a synchronous stream cipher submitted to the ECRYPT stream cipher

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:20:48
96Keystream / Distinguishing attack / Grain / KFB mode / Cryptography / Stream ciphers / T-function

Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:22:00
97VEST / T-function / Cryptographic nonce / Initialization vector / Weak key / ICE / Keystream / Cryptography / Stream ciphers / Salsa20

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:33:19
98Keystream / A5/1 / Block cipher / Linear feedback shift register / One-time pad / Cryptography / Stream ciphers / Cipher

Introduction to cryptography Ragni Ryvold Arnesen [removed] Norsk Regnesentral

Add to Reading List

Source URL: publications.nr.no

Language: English - Date: 2011-02-11 06:14:51
99Salsa20 / Keystream / Block cipher / Advanced Encryption Standard / Py / SOBER / Avalanche effect / Hash function / RC4 / Cryptography / Stream ciphers / Cryptographic hash function

FastFlex : A New Fast and Flexible Cryptographic Function

Add to Reading List

Source URL: fastflex.sourceforge.net

Language: English - Date: 2006-04-10 22:27:13
100Cryptanalysis / E0 / Fluhrer /  Mantin and Shamir attack / Index of cryptography articles / Cryptography / Stream ciphers / Keystream

Microsoft PowerPoint - rump_zuc.pptx

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-06 23:30:32
UPDATE