Shamir

Results: 186



#Item
91Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 14:40:46
92Computing / Payment systems / Silk Road / Business / Financial cryptography / Nakamoto / Electronic money / Bitcoin / Peer-to-peer computing / Electronic commerce

How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizm

Add to Reading List

Source URL: i.cdn.turner.com

Language: English - Date: 2013-11-25 09:53:45
93Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2012-10-14 17:28:33
94Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
95MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:54
96MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:54
97Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
98Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2013-12-16 07:37:43
99IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
UPDATE