Stream ciphers

Results: 475



#Item
11The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

Add to Reading List

Source URL: nifty.stanford.edu

Language: English - Date: 2006-02-28 18:53:58
12Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:08
13A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
14Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
15A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway†  June 17, 2003

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
16Stragglers of the Herd Get Eaten: Security Concerns for GSM Mobile Banking Applications Michael Paik New York University

Stragglers of the Herd Get Eaten: Security Concerns for GSM Mobile Banking Applications Michael Paik New York University

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2010-07-21 16:53:11
17Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
18Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
19The Search and Construction of Nonlinear Feedback Shift Registers

The Search and Construction of Nonlinear Feedback Shift Registers

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-08-14 05:43:02
20Scribe Notes: Lecture 3 COMPApplied Cryptography - Winter 2013 January 29, Stream Ciphers message {0,1}n

Scribe Notes: Lecture 3 COMPApplied Cryptography - Winter 2013 January 29, Stream Ciphers message {0,1}n

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:57