Running key cipher

Results: 13



#Item
1Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
2Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
3Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
4Polymorphic code / Substitution cipher / Computer virus / Cipher / A5/1 / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PRINCIPLES AND PRACTISE OF X-RAYING PERRIOT & FERRIE PRINCIPLES AND PRACTISE OF X-RA YING X-RAYING

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
5Running key cipher / Classical cipher / Keyword cipher / Ciphertext / Cipher / Tabula recta / Known-plaintext attack / One-time pad / Kasiski examination / Cryptography / Stream ciphers / Substitution cipher

Decoding Running Key Ciphers Sravana Reddy∗ Department of Computer Science The University of Chicago 1100 E. 58th Street Chicago, IL 60637, USA

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2012-06-21 10:18:58
6RSA / XTR / Ciphertext / ID-based encryption / Running key cipher / Cipher / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-08 21:20:23
7Advanced Encryption Standard / Substitution-permutation network / Differential cryptanalysis / Permutation / SAFER / Index of cryptography articles / Running key cipher / Cryptography / Block ciphers / Q

Dial C for Cipher Le chiffrement ´ etait presque parfait? Thomas Baign`eres?? and Matthieu Finiasz EPFL CH-1015 Lausanne – Switzerland

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
8Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
9RC4 / Ciphertext / One-time pad / Block cipher / Cipher / Correlation attack / Gilbert Vernam / Running key cipher / Cryptanalysis / Cryptography / Stream ciphers / Keystream

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
10Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
UPDATE