Back to Results
First PageMeta Content
Cipher / RC4 / Key schedule / Block cipher / Souradyuti Paul / Cryptanalysis / Tiny Encryption Algorithm / Cryptography / Stream ciphers / Py


Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses∗ Gautham Sekar, Souradyuti Paul and Bart Preneel
Add to Reading List

Open Document

File Size: 219,32 KB

Share Result on Facebook

City

Leuven-Heverlee / /

Company

Knudsen / /

Country

Belgium / /

Currency

pence / /

/

Facility

Interdisciplinary Institute / /

IndustryTerm

setup algorithms / setup algorithm / pseudorandom bit generation algorithm / /

Organization

Flemish Government / Katholieke Universiteit Leuven / Interdisciplinary Institute for BroadBand Technology / /

Person

Souradyuti Paul / Bart Preneel Katholieke Universiteit Leuven / /

Position

first author / second author / /

Product

Vizio L32 Television / Sony Ericsson P1i Smartphone / /

ProvinceOrState

Kansas / /

Technology

block cipher / WEP protocol / The pseudorandom bit generation algorithm / secret key / BroadBand Technology / key setup algorithm / 4 Algorithm / key setup algorithms / stream cipher / one-time key-scheduling algorithms / key scheduling algorithms / setup algorithms / pseudorandom bit generation algorithm / setup algorithm / /

SocialTag