Weak key

Results: 101



#Item
21Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
22Key Schedule Weaknesses in SAFER+ John Kelsey ∗  Bruce Schneier†

Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
23Twosh Technical Report #2  Empirical Verication of Twosh Key Uniqueness Properties Doug Whiting  David Wagnery

Two sh Technical Report #2 Empirical Veri cation of Two sh Key Uniqueness Properties Doug Whiting David Wagnery

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
24Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
25New Results on the Twosh Encryption Algorithm Bruce Schneier   y

New Results on the Two sh Encryption Algorithm Bruce Schneier  y

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
26Twofish Technical Report #6  A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
27Cryptanalysis of FROG David Wagner∗ Niels Ferguson†  Bruce Schneier‡

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
28Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
29Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ;  Abstract. RAKAPOSHI is a hardware oriented

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
30Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39