Keystream

Results: 169



#Item
51Substitution cipher / Ciphertext / Cipher / Keystream / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Whitenoise Laboratories Inc. Software Specifications For Tinnitus Utilizing Whitenoise Substitution

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-25 12:31:39
52Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
53Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
54Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Authenticated encryption / Cryptographic nonce / Advanced Encryption Standard / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
55Linear feedback shift register / NLFSR / Trivium / Keystream / State space / Stream ciphers / Cryptography / Grain

Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 09:15:34
56Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
57Cipher / Block cipher / Advanced Encryption Standard / KFB mode / VEST / Cryptography / Stream ciphers / Keystream

ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

Add to Reading List

Source URL: srtp.sourceforge.net

Language: English - Date: 2004-08-16 14:34:48
58Block cipher / Ciphertext / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Keystream

PRACTICAL CRYPTOGRAPHY Algorithms and Implementations Using C++ Edited by

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2015-02-10 15:23:47
59Phelix / Block cipher / RC4 / Ciphertext / Symmetric-key algorithm / Cipher / Advanced Encryption Standard / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
60Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
UPDATE