The Stream

Results: 6608



#Item
441

Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    442Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

    A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    443

    Robo-Ops Live Stream Requirements Live Stream Codes are due May 7, 2016. Teams are required to provide NIA with the Live Stream of their on-board camera feed. The rover(s) must also have an on-board microphone capable of

    Add to Reading List

    Source URL: robo-ops.nianet.org

    Language: English - Date: 2015-07-23 15:55:06
      444Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

      IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

      Add to Reading List

      Source URL: euler.ecs.umass.edu

      Language: English - Date: 2014-03-28 15:45:17
      445Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

      Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

      Add to Reading List

      Source URL: dedis.cs.yale.edu

      Language: English - Date: 2013-07-21 06:56:10
      446Computer data / Data / Probability of default / Telemetry / Stream / Technology / Business / Planetary Data System

      Data Processing Levels (for PDS4) Background PDS and its data providers have used both the CODMAC and NASA systems to describe data processing levels, sometimes in the same data set; this has led to confusion. In develop

      Add to Reading List

      Source URL: pds.nasa.gov

      Language: English - Date: 2015-01-09 14:56:17
      447

      Page 1 of 2 B5 Video Serializer/De-Serializer Companion Chips Overview Ambarella B5 companion chips enable the multi-stream capture of full-HD video for automotive and surveillance applications. Designed to support comp

      Add to Reading List

      Source URL: www.ambarella.com.cn

      Language: English - Date: 2015-11-02 16:05:14
        448

        Noël Skrzypcak Where do they come from, these vast ectoplasmic torrents and silent psychedelic storms that stream across the gallery walls, that escape upwards to the ceiling as well as leak down, and that ooze like bur

        Add to Reading List

        Source URL: www.nskzak.com

        Language: English - Date: 2010-05-25 07:19:55
          449

          Listen, Read and Learn Top communication training on topics you want, when you want, and at the depth you want Topics you want: Training is available for six streams of learning (see list overleaf). Each stream comprises

          Add to Reading List

          Source URL: www.sinicom.com

          Language: English - Date: 2008-07-01 11:37:19
            450

            The Tennessee Press Looking for a new revenue stream? BELIEVERS

            Add to Reading List

            Source URL: tnpress.com

            Language: English - Date: 2012-07-12 10:09:45
              UPDATE