Back to Results
First PageMeta Content
Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4


A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So
Add to Reading List

Document Date: 2007-03-15 14:18:24


Open Document

File Size: 201,59 KB

Share Result on Facebook

City

Leuven-Heverlee / /

Country

Belgium / /

Currency

pence / /

/

IndustryTerm

cryptographic applications / software applications / keystream generation algorithms / exhaustive search / speed applications / pseudorandom bit generation algorithm / /

NaturalFeature

Introduction Stream / Let mt / /

Organization

European Commission / Flemish Government / Katholieke Universiteit Leuven / /

Person

R. Jenkins Jr. / Py / Ron Rivest / Bart Preneel Katholieke Universiteit Leuven / Attack Scenario / Souradyuti Paul / /

Position

General / /

Product

Vizio L32 Television / Sj / /

ProvinceOrState

IA. / GOA / Iowa / /

Technology

encryption / Design Weak Key-setup algorithm / corresponding algorithm / key-setup algorithm / pseudorandom bit generation algorithm / key-setup algorithms / 8-bit processors / stream cipher / keystream generation algorithms / corresponding key-setup algorithms / /

SocialTag