Shamir

Results: 186



#Item
101Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-12-16 07:37:43
102Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2013-12-16 07:37:43
103Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2013-12-16 07:37:43
104Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2013-12-16 07:37:43
105Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2013-12-16 07:37:43
106Linear feedback shift register / Turing / Advanced Encryption Standard / Py / RC4 / Initialization vector / Grain / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / SOBER

1 The Turing Stream Cipher November 30, 2002 Turing: a fast stream cipher

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 00:48:29
107ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
108Uriel Feige / NP-complete problems / Computational complexity theory / Adi Shamir / Symposium on Theory of Computing / International Colloquium on Automata /  Languages and Programming / Symposium on Foundations of Computer Science / Approximation algorithm / Uriel / Theoretical computer science / Applied mathematics / Mathematics

Uriel Feige, Publications, JanuaryPapers are sorted by categories. For papers that have more than one version (typically, journal version and conference proceedings), the different versions are combined into one

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2015-01-02 09:14:39
109Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
110Zero-knowledge proof / Cryptographic hash functions / Cryptography / Polish State Railways / IP

Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE and Jacques PATARIN PRISM - University of Versailles In 1989, Adi Shamir [15] proposed a new zero-knowledge identication scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-04 14:25:42
UPDATE