Stream cipher

Results: 434



#Item
21

Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam1 , Kenneth Koon-Ho Wong1 , Harry Bartlett1 , Leonie Simpson1 , Ed Dawson1 , and Josef Pieprzyk1,2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-22 00:02:00
    22Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

    A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    23Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2014-03-28 15:45:17
    24Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

    Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-06-19 16:51:50
    25

    Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois1 , Karsten Nohl2 , and Sean O’Neil3 1 University College London, UK

    Add to Reading List

    Source URL: www.proxmark.org

    Language: English - Date: 2008-05-28 17:08:41
      26

      Stream cipher cryptanalysis Anne Canteaut http://www-rocq.inria.fr/secret/Anne.Canteaut/ Ice Break 2013

      Add to Reading List

      Source URL: ice.mat.dtu.dk

      Language: English - Date: 2013-06-11 11:42:42
        27

        ICS Technology Dragon-2: Fast Stream Cipher Encryption Description Features

        Add to Reading List

        Source URL: icsd.i2r.a-star.edu.sg

        Language: English - Date: 2015-09-30 21:14:26
          28

          Evaluation of RC4 Stream Cipher July 31, 2002 Information Security Research Centre Queensland University of Technology Ed Dawson, Helen Gustafson, Matt Henricksen, Bill Millan

          Add to Reading List

          Source URL: www.ipa.go.jp

          Language: English - Date: 2013-06-03 22:32:58
            29Internet Standards / Message authentication codes / Advanced Encryption Standard / Poly1305 / Stream ciphers / Cryptographic software / Salsa20 / Daniel J. Bernstein / Cipher suite / Authenticated encryption / LibreSSL / Transport Layer Security

            ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

            Add to Reading List

            Source URL: www.ietf.org

            Language: English - Date: 2013-11-05 13:13:43
            30Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

            The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2007-03-29 16:18:56
            UPDATE