Stream cipher

Results: 434



#Item
241Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
242Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
243RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
244ECRYPT / VEST / Block cipher / CRYPTON / Cipher / LEX / Cryptographic hash function / Data Encryption Standard / Crypto++ / Cryptography / Stream ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:35:07
245Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English
246Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
247Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, and Eric M. Smith R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA.

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
248Keystream / Block cipher / A5/1 / Symmetric-key algorithm / Salsa20 / Caesar cipher / Substitution cipher / RC4 / Cryptography / Stream ciphers / Cipher

Analysis of Lightweight Stream Ciphers PhD public defense Simon Fischer EPFL and FHNW April 18th 2008

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-04-17 18:36:42
249Linear feedback shift register / Stream cipher / Field extension / Mathematics / Espionage / Applied mathematics / Pseudorandom number generators / Correlation attack / Cryptography

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 Simon K¨ unzli4

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:21:54
250RC4 / Weak key / Stream cipher / Key size / Fluhrer /  Mantin and Shamir attack / Related-key attack / Cryptography / Pseudorandom number generators / Key management

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:31:48
UPDATE