Related-key attack

Results: 34



#Item
11Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
12Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
13Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
14ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
15Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
16RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
17IEEE 802.11 / Wireless networking / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Key management / RC4 / Aircrack-ng / Related-key attack / Wireless security / Cryptography / Computer network security / Cryptographic protocols

IEICE TRANS. FUNDAMENTALS, VOL.E91–B, NO.1 JANUARY[removed]PAPER

Add to Reading List

Source URL: www.rcis.aist.go.jp

Language: English - Date: 2008-08-26 03:02:15
18Wireless networking / Computing / IEEE 802.11 / Key management / Wireless security / Wi-Fi Protected Access / Wired Equivalent Privacy / Aircrack-ng / Related-key attack / Cryptography / Computer network security / Cryptographic protocols

Reaction Information Security Presents Wireless Security Whitepaper Reaction Information Security Lombard House Business Centre

Add to Reading List

Source URL: www.reactionpenetrationtesting.co.uk

Language: English - Date: 2013-03-07 12:55:11
19RC4 / Weak key / Stream cipher / Key size / Fluhrer /  Mantin and Shamir attack / Related-key attack / Cryptography / Pseudorandom number generators / Key management

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:31:48
20Computer network security / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11

Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin Technische Universit¨ at Darmstadt, Fachbereich Informatik

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2007-04-03 09:43:48
UPDATE