Stream cipher

Results: 434



#Item
391Feistel cipher / Blowfish / Advanced Encryption Standard / Symmetric-key algorithm / Stream cipher / Ciphertext / ICE / Cipher / Chosen-plaintext attack / Cryptography / Block ciphers / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-28 10:30:54
392Stream cipher / Cipher / Advanced Encryption Standard / Cryptanalysis / Initialization vector / A5/1 / Index of cryptography articles / Weak key / Cryptography / Common Scrambling Algorithm / Block cipher

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-08 12:46:17
393Block ciphers / Stream ciphers / Cipher / LEX / Symmetric-key algorithm / Q / Cryptographic hash function / UES / XSL attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-07-22 07:06:52
394Pseudorandom number generators / Randomness / RC4 / Combinatorics / Random permutation / Advantage / Stream cipher / Pseudorandomness / Markov chain / Cryptography / Mathematics / Permutations

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-06-01 07:12:43
395Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:32:23
396CCM mode / Cryptographic protocols / Secure communication / Block cipher / CBC-MAC / Authenticated encryption / Stream cipher / Cryptographic hash function / Advantage / Cryptography / Block cipher modes of operation / Message authentication codes

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:55:38
397Cryptographic hash functions / Hashing / SOBER / SHA-2 / Block cipher modes of operation / Hash function / Scream / MD5 / Linear feedback shift register / Cryptography / Stream ciphers / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-11-03 03:07:51
398Mersenne twister / Advanced Encryption Standard / Linear feedback shift register / ICE / Symmetric-key algorithm / Block cipher / CryptMT / Linear congruential generator / Cryptography / Pseudorandom number generators / Stream ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-01 04:04:14
399Adi Shamir / Ron Rivest / Leonard Adleman / RSA / RC4 / Cipher / Digital signature / Differential cryptanalysis / Stream cipher / Cryptography / Turing Award laureates / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.math.uwaterloo.ca

Language: English - Date: 2010-10-13 14:11:04
400Stream cipher / Correlation immunity / COMPASS/Sample Code / Mathematics / Applied mathematics / Cryptography / Keystream / Correlation attack

PDF Document

Add to Reading List

Source URL: www.matpack.de

Language: English - Date: 2012-04-30 08:07:22
UPDATE