RC4

Results: 194



#Item
161Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
162ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
163Pseudorandom number generators / Secure communication / Internet protocols / RC4 / Transport Layer Security / Keystream / Cipher suite / Block cipher modes of operation / E0 / Cryptography / Stream ciphers / Cryptographic protocols

A preliminary version of this paper appears in the proceedings of the USENIX Security Symposium[removed]This is the full version.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-05 12:29:08
164Cipher / RC4 / Key schedule / Block cipher / Souradyuti Paul / Cryptanalysis / Tiny Encryption Algorithm / Cryptography / Stream ciphers / Py

Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses∗ Gautham Sekar, Souradyuti Paul and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
165Advantage / RC4 / Keystream / SEED / Cryptography / Stream ciphers / Py

This paper appears under the same title in the proceedings of FSE[removed]Matt Robshaw, ed.), LNCS, Springer, 2006, pp[removed].

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
166IEEE 802.11 / Computer network security / Secure communication / Temporal Key Integrity Protocol / Wired Equivalent Privacy / IEEE 802.11i-2004 / Wireless security / CCMP / RC4 / Cryptography / Cryptographic protocols / Wireless networking

Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:51
167Keystream / VEST / Py / Correlation attack / A5/1 / RC4 / KFB mode / Stream ciphers / Cryptography / HC-256

The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
168Wireless networking / IEEE 802.11 / Advanced Encryption Standard / RC4 / Wired Equivalent Privacy / IEEE 802.11i-2004 / Public-key cryptography / Symmetric-key algorithm / Temporal Key Integrity Protocol / Cryptography / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: www.sis.pitt.edu

Language: English - Date: 2006-02-19 14:19:02
169Linear feedback shift register / RC4 / SOBER / Initialization vector / Turing / Keystream / Block cipher modes of operation / Weak key / SNOW / Cryptography / Stream ciphers / Correlation attack

PDF Document

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
170IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
UPDATE