Keystream

Results: 169



#Item
41COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
42State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1  Information Security Institute,

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 00:26:26
43Some Observations on HC-128 Subhamoy Maitra1 , Goutam Paul2 , Shashwat Raizada1 1 Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata, India.

Some Observations on HC-128 Subhamoy Maitra1 , Goutam Paul2 , Shashwat Raizada1 1 Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata, India.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-03 01:42:51
44Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ;  Abstract. RAKAPOSHI is a hardware oriented

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
45The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
46Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1  Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1 Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-29 01:05:15
47Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1T.E. Bjørstad The Selmer Center, Department of Informatics,

Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1T.E. Bjørstad The Selmer Center, Department of Informatics,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-02-26 08:39:55
48A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
49Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆  Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆ Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-27 22:31:32
50Breaking the Stream Cipher Whitenoise Hongjun Wu Institute for Infocomm Research, Singapore   Abstract. Whitenoise is a stream cipher with specification given at

Breaking the Stream Cipher Whitenoise Hongjun Wu Institute for Infocomm Research, Singapore Abstract. Whitenoise is a stream cipher with specification given at

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-20 01:10:36