Weak key

Results: 101



#Item
21Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
22Key management / SAFER / Padding / Slide attack / Weak key / Key schedule / Crypt / ICE / SXAL/MBAL / Cryptography / Block ciphers / Advanced Encryption Standard

Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
23Advanced Encryption Standard / Key schedule / Cryptography / Key management / Weak key

Two sh Technical Report #2 Empirical Veri cation of Two sh Key Uniqueness Properties Doug Whiting David Wagnery

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
24Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
25Key management / ICE / Weak key / International Data Encryption Algorithm / Cryptography / Advanced Encryption Standard / Block ciphers

New Results on the Two sh Encryption Algorithm Bruce Schneier  y

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
26Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
27Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
28Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
29Weak key / Keystream / Linear feedback shift register / E0 / Tiny Encryption Algorithm / Grain / Cryptography / Stream ciphers / Pseudorandom number generators

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
30Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39
UPDATE