One-time pad

Results: 106



#Item
81Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
82Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

644 IEEE

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
83Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-03-27 10:39:45
84Pseudorandom function family / One-time pad / Advantage / Cipher / Block ciphers / Initialization vector / Pseudorandom generator / Cryptography / Pseudorandomness / Stream cipher

Stream-Ciphers and Block-Ciphers Lecture 6

Add to Reading List

Source URL: www.cs.uiuc.edu

Language: English - Date: 2007-10-25 08:48:59
85Block cipher / Cryptanalysis / Symmetric-key algorithm / Cipher / One-time pad / Padding / Index of cryptography articles / FEAL / Cryptography / Differential cryptanalysis / Eli Biham

Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti

Add to Reading List

Source URL: webcourse.cs.technion.ac.il

Language: English - Date: 2006-11-05 09:06:55
86Cipher / Key size / Key / Encryption software / Symmetric-key algorithm / One-time pad / Brute-force attack / Export of cryptography in the United States / Encryption / Cryptography / Key management / Public-key cryptography

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
87Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
88Correlation attack / Linear feedback shift register / Weak key / Trivium / MICKEY / One-time pad / SOBER / Crypto-1 / Stream ciphers / Cryptography / Grain

A New Version of Grain-128 with Authentication Martin ˚ Agren1 , Martin Hell1 , Thomas Johansson1 , and Willi Meier2

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-02-07 09:17:31
89Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-10-22 12:01:39
90Public-key cryptography / Key / Symmetric-key algorithm / One-time pad / Trusted Platform Module / Cryptography / Computer security / Trusted Computing

Trusted Computing IY5608: The RTM and the TPM Infrastructure Working Group Activity

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-02-14 11:20:25
UPDATE