Related-key attack

Results: 34



#Item
21ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
22Computer network security / IEEE 802.11 / Computing / Wi-Fi Protected Access / Wired Equivalent Privacy / Temporal Key Integrity Protocol / Wireless security / IEEE 802.11i-2004 / Related-key attack / Cryptography / Cryptographic protocols / Wireless networking

WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? Frank H. Katz Armstrong Atlantic State University

Add to Reading List

Source URL: infotech.armstrong.edu

Language: English - Date: 2010-05-25 16:32:02
23Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Monitor mode / Cryptography / Wireless networking / Computer network security

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:45:01
24Differential cryptanalysis / Boomerang attack / ICE / Khufu and Khafre / Key schedule / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2009-07-25 16:36:14
25ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
26IEEE 802.11 / Computer network security / Secure communication / Temporal Key Integrity Protocol / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wired Equivalent Privacy / Aircrack-ng / Related-key attack / Cryptography / Cryptographic protocols / Wireless networking

asia29c-vanhoef.dvi

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2013-04-09 10:42:32
27RC4 / Distinguishing attack / Randomness / Internet protocols / Secure communication / Advantage / Fisher–Yates shuffle / Related-key attack / Pseudorandom generator / Cryptography / Stream ciphers / Pseudorandom number generators

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
28Symmetric-key algorithm / ANts P2P / Ciphertext / Cipher / Related-key attack / Block cipher modes of operation / Format-preserving encryption / Key Wrap / Cryptography / Advanced Encryption Standard / LEX

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-10 08:58:36
29Key management / Differential cryptanalysis / Key schedule / Boomerang attack / Weak key / Related-key attack / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 21:59:51
30IEEE 802.11 / Computer network security / Secure communication / Wired Equivalent Privacy / RC4 / Related-key attack / IEEE 802.11i-2004 / Fluhrer /  Mantin and Shamir attack / CCMP / Cryptography / Wireless networking / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-19 09:22:01
UPDATE