Keystream

Results: 169



#Item
11This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
12CS255: Introduction to Cryptography  Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
13What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2001-09-11 10:47:24
    14On a bias of Rabbit Jean-Philippe Aumasson FHNW, 5210 Windisch, Switzerland Abstract. This paper demonstrates the existence of a non-null bias in the keystream generated by the synchronous stream cipher Rabbit, a candida

    On a bias of Rabbit Jean-Philippe Aumasson FHNW, 5210 Windisch, Switzerland Abstract. This paper demonstrates the existence of a non-null bias in the keystream generated by the synchronous stream cipher Rabbit, a candida

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-02-22 22:33:16
      15What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

      What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2001-12-10 04:48:31
        16Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

        Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2006-02-13 07:41:30
        17How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

        How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2007-01-22 11:51:20
        18Cryptanalysis of Hermes8F Steve Babbage1 , Carlos Cid2 , Norbert Pramstaller3 and Håvard Raddum4 4  1

        Cryptanalysis of Hermes8F Steve Babbage1 , Carlos Cid2 , Norbert Pramstaller3 and Håvard Raddum4 4 1

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2006-08-13 05:59:44
        19Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

        Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2005-10-14 10:29:32
        20Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University)  Abstract. A large number of stream cipher were proposed and impleme

        Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University) Abstract. A large number of stream cipher were proposed and impleme

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2002-11-11 15:22:27