Stream cipher

Results: 434



#Item
171Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
172Cryptographic software / Cryptographic protocols / Internet protocols / Secure communication / RC4 / Stream cipher / Initialization vector / Transport Layer Security / Symmetric-key algorithm / Cryptography / Software / Computing

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [removed] Abstract. In this report, we point out a serious security flaw in Microsoft Word and Excel. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 07:26:49
173EK / Snuffle / Stream ciphers / Keystream / Block cipher modes of operation

  New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
174Keccak / Stream cipher / Hash function / Cryptography / NIST hash function competition / RC4

Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-10-27 13:26:00
175Cipher / Block cipher / Stream cipher / Cryptanalysis / RSA / Key / Digital signature / Index of cryptography articles / Book:Cryptography / Cryptography / Public-key cryptography / Key management

The Laws of Cryptography with Java Code by Neal R. Wagner Copyright c 2003 by Neal R. Wagner. All rights reserved.

Add to Reading List

Source URL: www.cs.utsa.edu

Language: English - Date: 2004-08-20 15:40:56
176Mathematics / Pseudorandom number generators / Cryptography / Error detection and correction / Correlation attack / Analysis of algorithms / Linear feedback shift register / Stream cipher / Parity bit / Theoretical computer science / Applied mathematics / Binary arithmetic

Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
177Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
178Symmetric-key algorithm / Cryptanalysis / Cipher / Novotel / Stream cipher / Cryptography / Block cipher / Serge Vaudenay

FSE 2013 Program Welcome reception will be at poolside of Novotel, and all technical sessions will be at Cinnamon Room of Novotel. The program is available in PDF. Sunday, 10 March 2013 •

Add to Reading List

Source URL: fse2013.spms.ntu.edu.sg

Language: English - Date: 2013-03-09 04:59:44
179VEST / Keystream / Initialization vector / NLFSR / B53 / B81 / Stream ciphers / Cryptography / Grain

Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-16 23:58:57
180Binary arithmetic / Linear feedback shift register / Stream cipher / Self-shrinking generator / Sequence / Computing / Shift register / Correlation attack / Grain / Pseudorandom number generators / Cryptography / Mathematics

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
UPDATE