Keystream

Results: 169



#Item
31Applied mathematics / Pseudorandom number generators / Cellular automata / Rule 30 / Cellular automaton / Keystream / One-time pad / Linear feedback shift register / Elementary cellular automaton / Cryptography / Stream ciphers / Mathematics

Nonuniform Cellular Automata for Cryptography

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2012-09-20 14:36:17
32Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
33A5/1 / GSM / SMS / Keystream / Um interface / IMSI-catcher / Stream ciphers / Technology / Mobile technology

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:32
34Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
35Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
36IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
37Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
38Stream ciphers / Keystream

Cryptanalysis of TWOPRIME Don Coppersmith IBM Research David Wagner

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
39A5/1 / Linear feedback shift register / Cellular Message Encryption Algorithm / Py / Correlation attack / RC4 / Cryptography / Stream ciphers / Keystream

Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE