Stream cipher

Results: 434



#Item
311Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-03-18 14:07:36
312Stream ciphers / Threefish / Skein / ICE / VEST / SHA-2 / SHA-1 / Block cipher / Salsa20 / Cryptography / Error detection and correction / Cryptographic hash functions

Improved Cryptanalysis of Skein 3 ¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-08 02:25:05
313Theoretical computer science / Direct-sequence spread spectrum / Pseudorandom noise / Steganography / Linear feedback shift register / Cryptography / Maximum length sequence / Pseudorandom binary sequence / Stream cipher / Pseudorandomness / Mathematics / Applied mathematics

NEW ASPECTS of SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY and ARTIFICIAL VISION Secure Steganography for Audio Signals

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2010-09-09 05:34:58
314Initialization vector / Cipher / Py / Rabbit / Crypt / MMH-Badger MAC / Cryptography / Stream ciphers / Block cipher modes of operation

Rabbit Stream Cipher, Algorithm Specification May 12, 2005

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 16:04:52
315Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
316IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
317Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
318Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
319Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
320Ring theory / Binary arithmetic / Boolean algebra / Bitwise operation / Mersenne twister / 128-bit / Function / Ring / Integer / Mathematics / Abstract algebra / Elementary mathematics

CryptMT Stream Cipher Ver. 3: Description Makoto Matsumoto1 , Mutsuo Saito2 , Takuji Nishimura3 , and Mariko Hagita4

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2008-06-20 03:24:04
UPDATE