XOR cipher

Results: 8



#Item
1

Asymmetric encryption with 2 XOR’s: the cipher TCHo Jean-Philippe Aumasson

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:47:00
    2Key management / Xor-encrypt-xor / Roscosmos State Corporation / Block cipher / Cipher

    From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour Pierre Karpman ´ Inria and Ecole polytechnique, France

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-15 05:33:19
    3Binary arithmetic / Linear feedback shift register / A5/1 / Cellular automaton / Field-programmable gate array / Digital electronics / Block cipher / XOR gate / Cryptography / Electronic engineering / Stream ciphers

    Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Add to Reading List

    Source URL: www.cba.mit.edu

    Language: English - Date: 2011-12-17 09:30:36
    4MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

    A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2005-02-28 15:02:35
    5Binary arithmetic / Linear feedback shift register / A5/1 / Cellular automaton / Field-programmable gate array / Digital electronics / Block cipher / XOR gate / Cryptography / Electronic engineering / Stream ciphers

    Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Add to Reading List

    Source URL: cba.mit.edu

    Language: English - Date: 2011-12-17 09:30:36
    6Computing / Embedded Linux / Smartphones / Malware / Dalvik / APK / Computer virus / Antivirus software / XOR cipher / Android / System software / Software

    AxelleApvrille_RuchaNigam-0714.indd

    Add to Reading List

    Source URL: www.virusbtn.com

    Language: English - Date: 2014-07-02 09:45:58
    7Ciphertext stealing / Authenticated encryption / Padding / Cipher / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

    Second Modes of Operation Workshop (August[removed]The XCBC-XOR, XECB-XOR and XECB-MAC Modes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-07 13:07:48
    8Known-plaintext attack / Cyclic redundancy check / Ciphertext / Py / XOR cipher / Block cipher modes of operation / Padding / Stream ciphers / Cryptography / Completeness

    ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

    Add to Reading List

    Source URL: math.ucr.edu

    Language: English - Date: 2006-03-09 16:25:49
    UPDATE