<--- Back to Details
First PageDocument Content
Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage
Date: 2014-03-02 23:18:30
Linear cryptanalysis
Weak key
Chosen-plaintext attack
Cryptanalysis
Ciphertext
Advanced Encryption Standard
FROG
Differential-linear attack
Running key cipher
Cryptography
Differential cryptanalysis
Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Download Document from Source Website

File Size: 193,47 KB

Share Document on Facebook

Similar Documents

Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

DocID: 1llOc - View Document

Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

DocID: 19j6Q - View Document

Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

DocID: 13kU3 - View Document

Polymorphic code / Substitution cipher / Computer virus / Cipher / A5/1 / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PRINCIPLES AND PRACTISE OF X-RAYING PERRIOT & FERRIE PRINCIPLES AND PRACTISE OF X-RA YING X-RAYING

DocID: YbhK - View Document

Running key cipher / Classical cipher / Keyword cipher / Ciphertext / Cipher / Tabula recta / Known-plaintext attack / One-time pad / Kasiski examination / Cryptography / Stream ciphers / Substitution cipher

Decoding Running Key Ciphers Sravana Reddy∗ Department of Computer Science The University of Chicago 1100 E. 58th Street Chicago, IL 60637, USA

DocID: GQSU - View Document