Stream cipher

Results: 434



#Item
221Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: aclweb.org

Language: English - Date: 2011-05-20 17:35:58
222Ciphertext / Cipher / RC4 / One-time pad / Block cipher / KFB mode / Cryptography / Stream ciphers / Symmetric-key algorithm

Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:25:02
223Cryptography / Keystream / Applied mathematics / Mathematics / Initialization vector / Block cipher modes of operation / Block cipher / Stream ciphers

Block Cipher Modes of Operation-CCM Mode for Authentication and Confidentiality

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:23:28
224Block cipher / Ciphertext / Triple DES / Ciphertext stealing / Residual block termination / Cryptography / Block cipher modes of operation / Stream ciphers

############################################################## Block Cipher Modes of Operation Cipher Block Chaining (CBC) ############################################################## CBC-TDES (Encryption) ------------

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 13:22:54
225Ciphertext / Block cipher / Ciphertext stealing / Residual block termination / Cryptography / Block cipher modes of operation / Stream ciphers

############################################################## Block Cipher Modes of Operation Cipher Block Chaining (CBC) IV is[removed][removed]08090A0B 0C0D0E0F

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 11:45:24
226Block cipher modes of operation / Linear feedback shift register / Block cipher / Keystream / Differential cryptanalysis / Cipher / KFB mode / Index of cryptography articles / Cryptography / Stream ciphers / Pseudorandom number generators

Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2000-10-19 13:37:14
227Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
228Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
229Ciphertext / Cipher / Cryptanalysis / Block cipher / A5/1 / Key size / Keystream / Multiple encryption / Unicity distance / Cryptography / Stream ciphers / Key management

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security David A. McGrew and Scott R. Fluhrer mcgrew, sfluhrer  @cisco.com Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2002-11-21 18:03:36
230Cryptographic hash functions / CRYPTREC / Key management / Pseudorandom number generators / Symmetric-key algorithm / Hierocrypt / Stream cipher / Key size / SHA-2 / Cryptography / Cryptography standards / Block ciphers

Report on Evaluation of Symmetric-Key Cryptographic Techniques May 22, 2003 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
UPDATE