Weak key

Results: 101



#Item
81Ciphertext / Block cipher / Cipher / Differential cryptanalysis / Cryptanalysis / Blowfish / Known-plaintext attack / Weak key / Vigenère cipher / Cryptography / Espionage / Slide attack

A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2008-10-23 15:16:37
82Correlation attack / Linear feedback shift register / Weak key / Trivium / MICKEY / One-time pad / SOBER / Crypto-1 / Stream ciphers / Cryptography / Grain

A New Version of Grain-128 with Authentication Martin ˚ Agren1 , Martin Hell1 , Thomas Johansson1 , and Willi Meier2

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-02-07 09:17:31
83Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

1 New Weak-Key Classes of IDEA

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
84Feistel cipher / Cipher / Key schedule / Block ciphers / Data Encryption Standard / Blowfish / Cryptography / ICE / Weak key

Sinople: a 128-bit symmetric block cipher

Add to Reading List

Source URL: www.philippepaquet.com

Language: English - Date: 2011-01-20 03:20:41
85Keystream / Block cipher / MUGI / Initialization vector / Weak key / Grain / QUAD / Cryptography / Stream ciphers / RC4

Dragon: A Fast Word Based Stream Cipher K. Chen1 , M. Henricksen1 , W. Millan1 , J. Fuller1 , L. Simpson1 , E. Dawson1 , H. Lee2 , and S. Moon3

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:53
86Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2008-11-03 10:06:11
87Key schedule / Crypt / Slide attack / Differential cryptanalysis / Cryptography / Blowfish / Weak key

A New Class of Weak Keys for Blowfish Orhun Kara and Cevat Manap ¨ ITAK

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
88Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
89ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
90Linear cryptanalysis / Data Encryption Standard / Differential cryptanalysis / Key schedule / Advanced Encryption Standard / Weak key / Serpent / Q / International Data Encryption Algorithm / Cryptography / Block ciphers / ICE

Serpent: A Proposal for the Advanced Encryption Standard Ross Anderson1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 07:39:15
UPDATE