Initialization

Results: 404



#Item
371Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Monitor mode / Cryptography / Wireless networking / Computer network security

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:45:01
372C++ / C programming language / Sizeof / C / Struct / Pointer / Initialization / New / SQL / Computing / Software engineering / Computer programming

INTERNATIONAL STANDARD ISO/IEC 9899:1999 TECHNICAL CORRIGENDUM 2 Published[removed]

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2005-03-23 17:55:33
373Keystream / Block cipher / MUGI / Initialization vector / Weak key / Grain / QUAD / Cryptography / Stream ciphers / RC4

Dragon: A Fast Word Based Stream Cipher K. Chen1 , M. Henricksen1 , W. Millan1 , J. Fuller1 , L. Simpson1 , E. Dawson1 , H. Lee2 , and S. Moon3

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:53
374ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
375Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
376Object-oriented programming / Method / Memory management / Garbage collection / Object / Constructor / Subroutine / Self / Resource Acquisition Is Initialization / Computer programming / Software engineering / Computing

Object Resurrection In Chapter 5, I briefly described the technique known as object resurrection, through which an object being finalized can store a reference to itself in a variable defined outside the class so that

Add to Reading List

Source URL: www.hesab.net

Language: English - Date: 2007-12-02 17:55:06
377Substitution cipher / Chosen-plaintext attack / Cryptanalysis / Plaintext / Cipher / Frequency analysis / Data Encryption Standard / Initialization vector / One-time pad / Cryptography / Espionage / Ciphertext

397 PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3, MARCH 1979

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:07
378Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: n-pn.info

Language: English - Date: 2011-11-21 22:49:00
379Roman consul / Object-oriented programming / Resource Acquisition Is Initialization / Siphon

New York State Digital Library

Add to Reading List

Source URL: fultonhistory.com

Language: English - Date: 2015-09-01 12:29:25
380Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
UPDATE