Stream cipher

Results: 434



#Item
111Monte Carlo methods / RC4 / Permutations / Randomness / Fisher–Yates shuffle / Cryptographically secure pseudorandom number generator / Distinguishing attack / Normal distribution / Stream cipher / Cryptography / Mathematics / Pseudorandom number generators

Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-06 10:02:01
112Weak key / Keystream / Linear feedback shift register / E0 / Tiny Encryption Algorithm / Grain / Cryptography / Stream ciphers / Pseudorandom number generators

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
113Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
114Block cipher modes of operation / Encryption software / Mask / Entropy / Cryptography / Advanced Encryption Standard / Stream cipher

Detecting Hidden Leakages Amir Moradi1 , Sylvain Guilley2,3 , Annelie Heuser2? 1 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-03-28 12:51:32
115Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
116Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 09:18:30
117Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
118Ciphertext / Chosen-plaintext attack / ICE / Cryptanalysis / Stream cipher / Grain / Linear cryptanalysis / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Block cipher

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
119Keystream / Maths24 / Games / COMPASS/Sample Code / Stream ciphers / Mega Man X / Correlation attack

Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1 Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-29 01:05:15
120Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29
UPDATE