Weak key

Results: 101



#Item
31Polynomials / Post-quantum cryptography / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Multivariate cryptography / Gröbner basis / Field extension / Abstract algebra / Algebra / Mathematics

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
32Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
33RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
34Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
35Computer network security / IEEE 802.11 / Wired Equivalent Privacy / Key management / Initialization vector / RC4 / Wireless LAN / Weak key / Cyclic redundancy check / Cryptography / Wireless networking / Cryptographic protocols

iALERT White Paper Hacking the Invisible Network Insecurities in 802.11x By Michael Sutton

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2002-08-14 12:56:51
36Certificate authorities / Cryptographic protocols / Electronic commerce / Comodo Group / Transport Layer Security / Public key certificate / X.509 / Verisign / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
37Economic growth / Recession / Australian property bubble / Economy of Russia / Economics / Macroeconomics / Gross domestic product

The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

Add to Reading List

Source URL: www.brownbird.com.au

Language: English - Date: 2015-03-08 21:05:51
38Economic growth / Recession / Australian property bubble / Economy of Russia / Economics / Macroeconomics / Gross domestic product

The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

Add to Reading List

Source URL: www.lumixwealth.com.au

Language: English - Date: 2015-03-05 17:15:07
39Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
40MOV / Brainfuck / Weak key / Block cipher / CPUID / High Level Assembly / Cryptography / X86 architecture / Blowfish

Microsoft Word - evilcry_blowfish.doc

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
UPDATE