Running key cipher

Results: 13



#Item
11Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
12Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PDF Document

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:40
13Polymorphic code / Substitution cipher / Computer virus / Cipher / A5/1 / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PDF Document

Add to Reading List

Source URL: pferrie.tripod.com

Language: English - Date: 2004-10-06 03:16:28
UPDATE