Keystream

Results: 169



#Item
21Security I – exercises Markus Kuhn Lent 2014 – CST Part IB  1

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19
22Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:33:26
23DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:22:24
24A Note on Algebraic Properties of Quasigroups in Edon80 Milan Vojvoda, Marek Sýs and Matú² Jókay , ,

A Note on Algebraic Properties of Quasigroups in Edon80 Milan Vojvoda, Marek Sýs and Matú² Jókay , ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-07 09:06:33
25Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
26CHAPTER  5 Cryptography ZHQM ZMGM ZMFM

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
27Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2010-01-29 01:17:36
28Intercepting GSM traffic Washington D.C., Feb 2008, Black Hat Briefing  Abstract: This talk is about GSM security. We will explain the security, technology and protocols of a GSM network. We will

Intercepting GSM traffic Washington D.C., Feb 2008, Black Hat Briefing Abstract: This talk is about GSM security. We will explain the security, technology and protocols of a GSM network. We will

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
29Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email:   Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email: Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-11 19:35:56
30MEP: Codes and Ciphers, Unit 12 One-Time Pads  Pupil Text 12 One-Time Pads A one-time pad is a random collection of letters, e.g. FXIPUF, which can be used to

MEP: Codes and Ciphers, Unit 12 One-Time Pads Pupil Text 12 One-Time Pads A one-time pad is a random collection of letters, e.g. FXIPUF, which can be used to

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 12:59:45