Correlation attack

Results: 76



#Item
41Computer security / Intrusion detection system / Snort / Thresh / Alert correlation / Network intrusion detection system / Denial-of-service attack / Evasion / ACARM-ng / Computer network security / System software / Software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2011-09-28 10:25:46
42Linear feedback shift register / Stream cipher / Field extension / Mathematics / Espionage / Applied mathematics / Pseudorandom number generators / Correlation attack / Cryptography

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 Simon K¨ unzli4

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:21:54
43Algebraic geometry / Valuation / Finite field / E-function / Correlation attack / Diophantine approximation / Schneider–Lang theorem / Field theory / Mathematics / Number theory

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 , Claude Carlet2 , Philippe Gaborit3 , Simon K¨ unzli4 , Willi Meier4 , and Olivier Ruatta3 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:48:47
44ICE / Differential cryptanalysis / Correlation attack / VEST / Cryptography / Stream ciphers / Salsa20

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 11:46:34
45Equations / Correlation attack / Cryptography / Differential equation / Nonlinear system / Linear equation / Linear system / Polynomial / QUAD / Elementary algebra / Mathematics / Stream ciphers

Algebraic Immunity of S-boxes and Augmented Functions Simon Fischer and Willi Meier FHNW, 5210 Windisch (Switzerland) Abstract. In this paper, the algebraic immunity of S-boxes and augmented functions of

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 12:41:00
46Linear feedback shift register / Correlation attack / VEST / A5/1 / E0 / Cipher / Achterbahn / Crypto-1 / Stream ciphers / Cryptography / Grain

Grain - A Stream Cipher for Constrained Environments Martin Hell1 , Thomas Johansson1 and Willi Meier2 1 Dept. of Information Technology, Lund University,

Add to Reading List

Source URL: edipermadi.files.wordpress.com

Language: English - Date: 2008-06-22 01:38:18
47RC4 / Ciphertext / One-time pad / Block cipher / Cipher / Correlation attack / Gilbert Vernam / Running key cipher / Cryptanalysis / Cryptography / Stream ciphers / Keystream

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
48VEST / Rabbit / Py / Grain / ZPAQ / Stream ciphers / Cryptography / Correlation attack

Rabbit: A New High-Performance Stream Cipher Martin Boesgaard, Mette Vesterager,

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 15:51:12
49Applied mathematics / Stream ciphers / Binary arithmetic / Linear feedback shift register / Correlation attack / E0 / Polynomial / Recurrence relation / RC4 / Cryptography / Pseudorandom number generators / Mathematics

New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-03 20:00:46
50Linear feedback shift register / Stream ciphers / Mathematics / Computing / Shift register / Correlation attack / Pseudorandom number generators / Cryptography / Binary arithmetic

Table of Linear Feedback Shift Registers Roy Ward, Tim Molteno∗ October 26, 2007

Add to Reading List

Source URL: www.eej.ulst.ac.uk

Language: English - Date: 2008-11-10 20:02:05
UPDATE