RC4

Results: 194



#Item
141Permutations / RC4 / Randomness / Cryptographically secure pseudorandom number generator / Fisher–Yates shuffle / Distinguishing attack / ICE / Tiny Encryption Algorithm / Py / Cryptography / Stream ciphers / Pseudorandom number generators

VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-20 09:15:57
142VEST / Rabbit / Advanced Encryption Standard / Hamming weight / Grain / RC4 / Cryptography / Stream ciphers / Block cipher

The Rabbit Stream Cipher - Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette Vesterager, and Erik Zenner CRYPTICO A/S

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 15:56:21
143Algebra / QUAD / Keystream / Quadratic form / RC4 / Pseudorandom number generator / Hidden Field Equations / XTR / Quadratic / Cryptography / Stream ciphers / Mathematics

QUAD: a Practical Stream Cipher with Provable Security Cˆ

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
144Keystream / RC4 / Scream / Block cipher / Pseudorandom number generator / Feistel cipher / KFB mode / Index of cryptography articles / Stream ciphers / Cryptography / QUAD

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
145Applied mathematics / Stream ciphers / Binary arithmetic / Linear feedback shift register / Correlation attack / E0 / Polynomial / Recurrence relation / RC4 / Cryptography / Pseudorandom number generators / Mathematics

New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-03 20:00:46
146IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
147RC4 / Fluhrer /  Mantin and Shamir attack / Grain / Stream ciphers / Cryptography / Keystream

Cryptanalysis of Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-07-18 08:11:42
148Computing / Stream ciphers / IEEE 802.11 / Wireless networking / Wired Equivalent Privacy / Keystream / Wi-Fi Protected Access / RC4 / IEEE 802.11i-2004 / Cryptography / Computer network security / Cryptographic protocols

The Final Nail in WEP’s Coffin Andrea Bittau University College London

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2006-03-13 10:52:35
149Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
150IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
UPDATE