Keystream

Results: 169



#Item
61Cryptography / Pseudorandom generator theorem / Hard-core predicate / Pseudorandom generator / Keystream / Exponential distribution / Itō diffusion / Pseudorandomness / Theoretical computer science / Mathematics

BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2001-03-16 15:30:07
62IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Ciphertext / Cryptography / Computer network security / Cryptographic protocols

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
63IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
64Keystream / Rotor machine / Cipher / Cryptanalysis / One-time pad / Block cipher / Enigma machine / Linear cryptanalysis / Differential cryptanalysis / Cryptography / Stream ciphers / Substitution cipher

Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 13:01:48
65Keystream / RC4 / Stream ciphers / Cryptography / Py

17th March[removed]FSE 2006 Email: [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
66RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
67EK / Snuffle / Stream ciphers / Keystream / Block cipher modes of operation

  New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
68VEST / Keystream / Initialization vector / NLFSR / B53 / B81 / Stream ciphers / Cryptography / Grain

Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-16 23:58:57
69A5/1 / Keystream / Cipher / Digital signal processor / QUAD / Symmetric-key algorithm / Key size / Linear feedback shift register / Cryptography / Stream ciphers / Pseudorandom number generators

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz Horst-Goertz Institute for IT Security Ruhr-University Bochum, Ger

Add to Reading List

Source URL: gmr.crypto.rub.de

Language: English - Date: 2012-02-07 10:58:42
70Fault injection / Grain / Trivium / Fault / Stream ciphers / Geology / Keystream

Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Prakash Dey1 , Abhishek Chakraborty2 , Avishek Adhikari1 and Debdeep Mukhopadhyay2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 07:21:10
UPDATE