Stream cipher

Results: 434



#Item
191Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-20 17:35:58
192Classical cipher / Applied mathematics / Affine cipher / Substitution cipher / Stream ciphers / Cipher

The Copiale Cipher* Kevin Knight Beáta Megyesi and Christiane Schaefer USC Information Sciences Institute

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-19 10:17:04
193Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
194NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
195Initialization vector / Cipher / Substitution cipher / WAKE / A5/1 / Keystream / Py / Correlation attack / Grain / Cryptography / Stream ciphers / Block cipher

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 09:57:44
196Boolean algebra / Binary arithmetic / Linear feedback shift register / Stream cipher / Advanced Encryption Standard / Boolean function / Computational complexity theory / Recurrence relation / Correlation attack / Cryptography / Mathematics / Pseudorandom number generators

On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-14 12:04:50
197Monoid / Ciphertext / Cipher / Learning with errors / Transposition cipher / Classical cipher / Stream cipher / Mathematical sciences / Cryptography / Mathematics / Algebra

Sage Reference Manual: Cryptography Release 6.3 The Sage Development Team August 11, 2014

Add to Reading List

Source URL: www.sagemath.org

Language: English - Date: 2014-11-16 14:58:22
198Cipher / Caesar cipher / Known-plaintext attack / Vigenère cipher / Affine cipher / Cryptography / Substitution cipher / Stream ciphers

Mehran Sahami CS 106A Handout #26 October 22, 2007

Add to Reading List

Source URL: see.stanford.edu

Language: English - Date: 2007-12-11 13:36:52
199Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
200English phonology / SAMPA / Speech Assessment Methods Phonetic Alphabet chart for English / Classical cipher / Computer programming / Computing / Software engineering

SHORT PAPERS AND NOTES mt:diurn rarige. T h e methodn tieucril~ecl1)clow were cleveloped tipc:c:iCic:ally to inensure low LO-rnediumlevels of uctivity H A a functior~oj swimming speetl. F. E . 5. F r y ( p r u . comm.) h

Add to Reading List

Source URL: www.stream.fs.fed.us

Language: English - Date: 2013-03-28 15:07:58
UPDATE