Weak key

Results: 101



#Item
61RC4 / Weak key / Stream cipher / Key size / Fluhrer /  Mantin and Shamir attack / Related-key attack / Cryptography / Pseudorandom number generators / Key management

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:31:48
62ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
63Trivium / ICE / Initialization vector / VEST / Weak key / Block cipher / Symmetric-key algorithm / Cryptography / Stream ciphers / Grain

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
64VEST / T-function / Cryptographic nonce / Initialization vector / Weak key / ICE / Keystream / Cryptography / Stream ciphers / Salsa20

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:33:19
65Education / Economics / International relations / Programme for International Student Assessment / 16th arrondissement of Paris / International trade / Organisation for Economic Co-operation and Development

  NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 14:12:59
66Business ethics / Corruption / Organisation for Economic Co-operation and Development / Social responsibility / International factor movements / OECD Guidelines for Multinational Enterprises / Corporate social responsibility / AccountAbility / Non-governmental organization / International economics / Economics / Business

MULTINATIONAL ENTERPRISES AND PUBLIC INTEGRITY: THE ROLE OF THE OECD GUIDELINES1 Improved public governance is key to the transparency and integrity of the global system. Some zones have weak government accountability an

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 19:44:03
67Community building / Behavior / Sociology / Social systems / Networks / Interpersonal ties / Bridge / Mark Granovetter / Renren / Science / Structure / Social networks

APS/EK10599 Weak Ties: Subtle Role of Information Diffusion in Online Social Networks Jichang Zhao State Key Laboratory of Software Development Environment, Beihang University, Beijing[removed], P.R.China

Add to Reading List

Source URL: ipv6.nlsde.buaa.edu.cn

Language: English - Date: 2010-12-13 23:31:39
68Education / Economics / International relations / Programme for International Student Assessment / 16th arrondissement of Paris / International trade / Organisation for Economic Co-operation and Development

  NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2013-08-19 01:58:21
69Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-02 15:01:16
70Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
UPDATE