Keystream

Results: 169



#Item
121Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
122Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
123Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
124IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
125Pseudorandomness / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Keystream / SEAL / Cipher / SHA-1 / Block cipher / Cryptography / Stream ciphers / Theoretical computer science

To appear in J. of Cryptology

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2008-09-21 22:35:16
126Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
127Side channel attack / MICKEY / Grain / ESTREAM / Block cipher / Keystream / Py / Cipher / Stream ciphers / Cryptography / Power analysis

Faculteit Ingenieurswetenschappen Departement

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
128Trivium / RC4 / Grain / Phelix / A5/1 / Linear cryptanalysis / MICKEY / E0 / Cipher / Stream ciphers / Cryptography / Keystream

Two Trivial Attacks on Trivium Alexander Maximov and Alex Biryukov Laboratory of Algorithmics, Cryptology and Security

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-01 09:50:27
129Keystream / Grain / Stream ciphers / Py / Dragon

The Dragon Is Alive and Well Ed Dawson, Matt Henricksen, Willam Millan, and Leonie Simpson Information Security Institute,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-12 04:07:16
130Grain / RC4 / Phelix / One-time pad / Py / Cipher / Advantage / Block cipher / Rabbit / Stream ciphers / Cryptography / Keystream

Attack the Dragon H˚ akan Englund and Alexander Maximov

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 05:17:45
UPDATE