Back to Results
First PageMeta Content
Ciphertext / Cipher / Cryptanalysis / Block cipher / A5/1 / Key size / Keystream / Multiple encryption / Unicity distance / Cryptography / Stream ciphers / Key management


Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security David A. McGrew and Scott R. Fluhrer mcgrew, sfluhrer  @cisco.com Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134
Add to Reading List

Document Date: 2002-11-21 18:03:36


Open Document

File Size: 108,20 KB

Share Result on Facebook

City

San Jose / /

Company

U Lc / Cisco Systems Inc. / /

/

IndustryTerm

Wireless LAN Security / Internet Security David A. McGrew / typical protocol / important Internet protocols / higher-level protocols / Internet security / Internet Protocol / attack algorithm / computing / exhaustive search / /

Person

Scott R. Fluhrer / /

ProgrammingLanguage

EC / R / C / /

ProvinceOrState

California / /

Technology

Encryption / attack algorithm / important Internet protocols / higher-level protocols / resulting algorithm / TMTO attack algorithm / IP / typical protocol / SSH protocols / block cipher / HTTP / M. The attack algorithm / GSM / UDP protocols / secret key / UDP / SSL / Bluetooth / TCP/IP / IP protocol / stream cipher / Wireless LAN / /

SocialTag