Weak key

Results: 101



#Item
11Mathematics / Applied mathematics / Information theory / Random number generation / Entropy / Modular arithmetic / Key management / Linear congruential generator / Pseudo-ring / Cryptography / Pseudorandom number generators / Randomness

Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-07-17 09:45:36
12Advanced Encryption Standard / Cipher / GOST / Feistel cipher / Linear cryptanalysis / ICE / Weak key / Symmetric-key algorithm / Serpent / Cryptography / Block ciphers / Key schedule

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
13Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 14:40:46
14Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
15Initialization vector / Weak key / Ciphertext / Encryption / Cryptography / Cryptanalysis / RC4

Introduction Office Encryption Principle of Cryptanalysis

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2009-10-28 10:48:05
16RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:13
17Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
18Financial statements / Generally Accepted Accounting Principles / International Financial Reporting Standards / Income statement / Revenue / Cash flow statement / Tax / Operating margin / Net profit / Accountancy / Finance / Business

McBride plc Half-Year Report 2014 Passionate about Private Label Many of McBride’s key markets and categories have continued to experience weak trading environments.

Add to Reading List

Source URL: www.mcbride.co.uk

Language: English - Date: 2015-02-26 08:04:54
19Advanced Encryption Standard / Block ciphers / S-box / Weak key / ICE / Differential cryptanalysis / Key size / MARS / Cryptanalysis / Cryptography / Key management / Twofish

Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE