Stream cipher

Results: 434



#Item
201Classical cipher / Jan Willem Klop / Computer programming / Computing / Software engineering

TRANSACTIONS of the AMERICAN FISHERIES SOCIETY ABSTRACT

Add to Reading List

Source URL: www.stream.fs.fed.us

Language: English - Date: 2013-03-28 15:08:10
202Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
203Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

First Modes of Operation Workshop (October[removed]CTR Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:57
204Stream ciphers / Differential cryptanalysis / Boomerang attack / Block cipher / E0 / XTEA / Linear feedback shift register / Constraint programming / Salsa20 / Cryptography / Pseudorandom number generators / SHACAL

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-18 13:28:11
205Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
206Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
207Classical cipher / Word square / Computer programming / Computing / Software engineering

CONSTRUCTION AND EVALUATION OF SUBMERGED VANES FOR STREAM CONTROL Research Project No. HR-274 Submitted to The Highway Division Iowa Department of Transportation

Add to Reading List

Source URL: www.iowadot.gov

Language: English - Date: 2014-04-16 17:20:00
208Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
209Checksum / Advantage / Block cipher / IAPM / RSA / Keystream / Cryptography / Stream ciphers / Block cipher modes of operation

Parallelizable Encryption Mode with Almost Free Message Integrity Charanjit S. Jutla IBM T. J. Watson Research Center, Yorktown Heights, NY[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:27:45
210Vigenère cipher / Substitution cipher / Caesar cipher / Cryptanalysis / Block cipher / Keystream / Playfair cipher / Known-plaintext attack / Chosen-plaintext attack / Cryptography / Stream ciphers / Cipher

DOC Document

Add to Reading List

Source URL: www.gresham.ac.uk

Language: English - Date: 2013-10-22 10:31:56
UPDATE