Weak key

Results: 101



#Item
31A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
32Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
33Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
34Hacker Intelligence Initiative  Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness  Abstract

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
35iALERT White Paper  Hacking the Invisible Network Insecurities in 802.11x By Michael Sutton

iALERT White Paper Hacking the Invisible Network Insecurities in 802.11x By Michael Sutton

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2002-08-14 12:56:51
36Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
37The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

Add to Reading List

Source URL: www.brownbird.com.au

Language: English - Date: 2015-03-08 21:05:51
38The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

The Australian economy still in the doldrums with more help from the RBA and $A needed Key points > Australian economic growth remains weak at 2.5%. > Expect another one or two RBA cash rate cuts and the $A to fall to ar

Add to Reading List

Source URL: www.lumixwealth.com.au

Language: English - Date: 2015-03-05 17:15:07
39© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
40Microsoft Word - evilcry_blowfish.doc

Microsoft Word - evilcry_blowfish.doc

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56