Stream cipher

Results: 434



#Item
271LOKI / Differential cryptanalysis / Alternating step generator / Summation generator / Lecture Notes in Computer Science / Cryptanalysis / Stream cipher / Cipher / SAFER / Cryptography / Block ciphers / Data Encryption Standard

Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
272Cryptographic hash function / Block cipher / Cryptographic primitive / Pseudorandom number generator / Stream cipher / Digital signature / Key size / CRYPTREC / FIPS 140-2 / Cryptography / Key management / Symmetric-key algorithm

Procedure for submitting cryptographic techniques (Provisional Translation) Information-technology Promotion Agency, Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
273Symmetric-key algorithm / Cryptography standards / Stream cipher / Block cipher / CRYPTREC / Cryptography / Public-key cryptography / Formal sciences

DOC Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
274Ciphertext / Caesar cipher / Known-plaintext attack / Cipher / Cryptanalysis / Chosen-plaintext attack / Four-square cipher / Cryptography / Stream ciphers / Vigenère cipher

Vigenere Cipher in Lisp gene m. stover created Tuesday, 2004 August 3 updated Monday, 2006 April 17 Copyright copyright 2004, 2006 Gene Michael Stover. All rights reserved. Permission to copy, store, & view this document

Add to Reading List

Source URL: cybertiggyr.com

Language: English - Date: 2014-06-08 02:17:23
275Internet protocols / Secure communication / RC4 / Key size / Transport Layer Security / Cryptographic hash function / Cryptanalysis / Py / Block cipher / Cryptography / Stream ciphers / Cryptographic protocols

Microsoft PowerPoint - preneel_closing_isse13v1

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:05:56
276University of Cambridge Computer Laboratory / Key schedule / Linear cryptanalysis / Block cipher / Grain / ICE / Advanced Encryption Standard / Cipher / Churning / Cryptography / Stream ciphers / Tiny Encryption Algorithm

A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-14 05:03:01
277Stream ciphers / Message authentication codes / Block cipher / Data Encryption Standard / Cipher / Linear cryptanalysis / Nicolas Courtois / Key schedule / Hidden Field Equations / Cryptography / XSL attack / Advanced Encryption Standard

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
278Keystream / Grain / RC4 / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalysis of a Stream Cipher due to Lin and Shepherd Simon R. Blackburn Karl Brincaty Fauzan Mirza Sean Murphy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:38:56
279Block cipher / Differential equation / LEX / XSL attack / Cryptography / Advanced Encryption Standard / Stream ciphers

Small Scale Variants of the AES C. Cid? , S. Murphy, and M.J.B. Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. {Carlos.Cid,S.Murphy,M.Robshaw}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:49:06
280Ciphertext / Chosen-plaintext attack / Block cipher / Linear cryptanalysis / Maximum likelihood / Likelihood function / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

LIKELIHOOD ESTIMATION FOR BLOCK CIPHER KEYS Sean Murphy, Fred Piper, Michael Walker(y), Peter Wild Information Security Group (y)Vodafone Limited Royal Holloway The Courtyard

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:16
UPDATE