Keystream

Results: 169



#Item
41Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
42Keystream / Linear feedback shift register / NLFSR / Correlation attack / QUAD / Stream ciphers / Cryptography / Grain

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 00:26:26
43Stream ciphers / Keystream / H1

Some Observations on HC-128 Subhamoy Maitra1 , Goutam Paul2 , Shashwat Raizada1 1 Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata, India.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-03 01:42:51
44Weak key / Keystream / Linear feedback shift register / E0 / Tiny Encryption Algorithm / Grain / Cryptography / Stream ciphers / Pseudorandom number generators

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
45Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
46Keystream / Maths24 / Games / COMPASS/Sample Code / Stream ciphers / Mega Man X / Correlation attack

Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1 Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-29 01:05:15
47MICKEY / A5/1 / ESTREAM / Keystream / Cipher / Block cipher / Py / VEST / Trivium / Stream ciphers / Cryptography / Grain

Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1T.E. Bjørstad The Selmer Center, Department of Informatics,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-02-26 08:39:55
48Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
49IBM 728 / Keystream / Stream cipher / Leninets class submarine

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆ Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-27 22:31:32
50Key schedule / Crypt / Cryptography / Stream ciphers / Keystream

Breaking the Stream Cipher Whitenoise Hongjun Wu Institute for Infocomm Research, Singapore Abstract. Whitenoise is a stream cipher with specification given at

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-20 01:10:36
UPDATE