RC4

Results: 194



#Item
31Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University)  Abstract. A large number of stream cipher were proposed and impleme

Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University) Abstract. A large number of stream cipher were proposed and impleme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-11 15:22:27
32Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:33:26
33Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung  Why Android SSL was dow

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung Why Android SSL was dow

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2013-12-11 11:42:27
34SSL/TLS Deployment Best Practices

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 14:35:42
35This POODLE Bites: Exploiting The SSL 3.0 Fallback Page 1

This POODLE Bites: Exploiting The SSL 3.0 Fallback Page 1

Add to Reading List

Source URL: poodlebleed.com

Language: English - Date: 2014-10-15 00:08:45
361 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
37The	
  Factoring	
  Dead	
   Preparing	
  for	
  the	
  Cryptopocalypse	
   Thomas	
  Ptacek,	
  Matasano	
   Tom	
  Ritter,	
  iSEC	
  Partners	
   Javed	
  Samuel,	
  iSEC	
  Partners	
  	
  

The  Factoring  Dead   Preparing  for  the  Cryptopocalypse   Thomas  Ptacek,  Matasano   Tom  Ritter,  iSEC  Partners   Javed  Samuel,  iSEC  Partners    

Add to Reading List

Source URL: isecpartners.com

Language: English - Date: 2013-08-01 16:17:40
38Identifying and Responding to Wireless Attacks Chris Hurley (roamer)   Contents

Identifying and Responding to Wireless Attacks Chris Hurley (roamer) Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
39Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-08 16:07:20
40SMALL SYSTEMS  BIG HEARTS Residential College 4, where you will find yourself experiencing

SMALL SYSTEMS BIG HEARTS Residential College 4, where you will find yourself experiencing

Add to Reading List

Source URL: rc4.nus.edu.sg

Language: English - Date: 2015-03-03 19:40:04