Stream cipher

Results: 434



#Item
331Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
332Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
333Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
334Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
335Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
336Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

644 IEEE

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
337IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
338Pseudorandomness / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Keystream / SEAL / Cipher / SHA-1 / Block cipher / Cryptography / Stream ciphers / Theoretical computer science

To appear in J. of Cryptology

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2008-09-21 22:35:16
339Pseudorandom function family / One-time pad / Advantage / Cipher / Block ciphers / Initialization vector / Pseudorandom generator / Cryptography / Pseudorandomness / Stream cipher

Stream-Ciphers and Block-Ciphers Lecture 6

Add to Reading List

Source URL: www.cs.uiuc.edu

Language: English - Date: 2007-10-25 08:48:59
340Binary arithmetic / Linear feedback shift register / Berlekamp–Massey algorithm / RC4 / Q / ORYX / Cipher / NLFSR / Grain / Cryptography / Stream ciphers / Pseudorandom number generators

Stream Ciphers Stream Ciphers

Add to Reading List

Source URL: www.cs.sjsu.edu

Language: English - Date: 2008-04-17 11:52:39
UPDATE