Stream cipher

Results: 434



#Item
211Internet / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Stream Control Transmission Protocol / Cipher suite / Internet protocols / Network architecture / Computing

Version 1.0 Robin Seggelmann ([removed]) License: UVM, CC-BY-ND In this document the Datagram Transport Layer Security (DTLS) protocol, a modifcation of the Transmission Control Protocol (TCP) for unrelia

Add to Reading List

Source URL: robin-seggelmann.de

Language: English - Date: 2011-05-13 04:29:27
212C programming language / International Obfuscated C Code Contest / Classical cipher / Computer programming / Computing / Software engineering

LA-8457-MS Informal Report An Overview of the National Uranium Resource Evaluation Hydrogeochemical and Stream Sediment

Add to Reading List

Source URL: pubs.usgs.gov

Language: English - Date: 2006-05-22 19:45:02
213Advanced Encryption Standard / ICE / RC4 / Advantage / Cipher / Key schedule / Serpent / Data Encryption Standard / Format-preserving encryption / Cryptography / Block ciphers / Stream ciphers

Transparent Harddisk Encryption Thomas Pornin ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, 45 rue d’Ulm, 75005 Paris, France

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
214Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
215SOSEMANUK / UES / Advanced Encryption Standard / Lecture Notes in Computer Science / Cipher / ECRYPT / ESTREAM / Cryptography / Stream ciphers / DECIM

Thomas PORNIN 2977 rue de Deschambault Québec G1W 1B4 Québec – Canada Tel: +1 (418) 977-7531

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
216Binary arithmetic / Linear feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shift register / Stream ciphers / Cryptography / Pseudorandom number generators

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
217Tanzanian conservation organisations / Classical cipher / Computer programming / Computing / Software engineering

ORGDP NATIONAL URANIUM RESOURCE EVALUATION PROGRAM HYDROGEOCHEMICAL AND STREAM SEDIMENT RECONNAISSANCE PROCEDURES OF THE URANIUM RESOURCE EVALUATION PROJECT

Add to Reading List

Source URL: pubs.usgs.gov

Language: English - Date: 2006-05-22 19:33:26
218Classical cipher / The Alphabet Cipher / Computer programming / Computing / Software engineering

Lawrence Livermore Laboratory HYDROGEOCHEMICAL AND STREAM-SEDIMENT SURVEY OF THE NATIONAL URANIUM RESOURCE EVALUATION (NURE) PROGRAM Q u a r t e r l y P r o g r e s s Report A p r i l t h r o u g h J u n e 1976

Add to Reading List

Source URL: pubs.usgs.gov

Language: English - Date: 2006-05-22 19:19:15
219Linear feedback shift register / SNOW / Block cipher modes of operation / Serpent / Primitive polynomial / Q / Grain / Cryptography / Stream ciphers / SOSEMANUK

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
220Block cipher / Differential cryptanalysis / Shift register / Linear feedback shift register / Cryptographic hash function / Grain / Trivium / Cryptography / Stream ciphers / VEST

Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
UPDATE