Stream cipher

Results: 434



#Item
361Keystream / Shift register / Correlation attack / A5/1 / Stream ciphers / Cryptography / MICKEY

The stream cipher MICKEY[removed]Steve Babbage

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-08-18 11:15:27
362Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2008-11-03 10:06:11
363Keystream / RC4 / Block cipher / Pseudorandom number generator / Scream / Cipher / KFB mode / Index of cryptography articles / Cryptography / Stream ciphers / QUAD

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:04:49
364Salsa20 / Trivium / Phelix / VEST / Throughput / Advanced Encryption Standard / Grain / DEAL / Nvidia Ion / Stream ciphers / Cryptography / ESTREAM

Hardware results for selected stream cipher candidates T. Good and M. Benaissa Department of Electrical & Electronic Engineering,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-23 06:17:42
365Cipher / Linear cryptanalysis / Block cipher / Keystream / SOBER / Classical cipher / Mercy / Cryptography / Stream ciphers / Q

Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:32
366Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
367VEST / Block cipher / Linear feedback shift register / Cube attack / Grain / Stream ciphers / Cryptography / Trivium

Trivium Specifications Christophe De Canni`ere

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-16 08:25:40
368Ciphertext / One-time pad / Chosen-plaintext attack / Gilbert Vernam / Cryptanalysis / Cipher / Vigenère cipher / Ciphertext stealing / Cryptography / Stream ciphers / Keystream

A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis

Add to Reading List

Source URL: csis.bits-pilani.ac.in

Language: English - Date: 2008-05-21 02:03:20
369ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
370Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
UPDATE