Stream cipher

Results: 434



#Item
51Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
52Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University)  Abstract. A large number of stream cipher were proposed and impleme

Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University) Abstract. A large number of stream cipher were proposed and impleme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-11 15:22:27
53Security I – exercises Markus Kuhn Lent 2014 – CST Part IB  1

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19
54Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12
55Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
56This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
57CHAPTER  5 Cryptography ZHQM ZMGM ZMFM

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
581 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
59Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2010-01-29 01:17:36
60Mathematics Enhancement Programme  Codes and UNIT 12 One-Time Pads Lesson Plan 1 Ciphers

Mathematics Enhancement Programme Codes and UNIT 12 One-Time Pads Lesson Plan 1 Ciphers

Add to Reading List

Source URL: www.cimt.plymouth.ac.uk

Language: English - Date: 2005-08-11 12:59:43