Stream ciphers

Results: 475



#Item
11Cryptography / Stream ciphers / Pseudorandom number generators / Solitaire / Keystream / Playing card

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

Add to Reading List

Source URL: nifty.stanford.edu

Language: English - Date: 2006-02-28 18:53:58
12Cryptography / Pseudorandom number generators / Stream ciphers / Feedback with Carry Shift Registers / Shrinking generator / Self-shrinking generator / Linear-feedback shift register / P-adic number / VEST

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:08
13Block ciphers / Data Encryption Standard / Linear cryptanalysis / Advanced Encryption Standard / Q / S-box / ICE / Differential cryptanalysis / VEST / PRESENT / Stream cipher / Key schedule

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
14Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
15Disk encryption theory / Cryptography / Block cipher / Advantage / Stream ciphers / Cipher / Vigenre cipher / Format-preserving encryption

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
16Mobile telecommunications / Stream ciphers / Videotelephony / Vodafone / GSM / OpenBTS / Subscriber identity module / A5/1 / Short Message Service / SIM Application Toolkit / Unstructured Supplementary Service Data / M-Pesa

Stragglers of the Herd Get Eaten: Security Concerns for GSM Mobile Banking Applications Michael Paik New York University

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2010-07-21 16:53:11
17Cryptography / Applied mathematics / Stream ciphers / Public-key cryptography / E-commerce / RSA / Cryptanalysis / Vigenre cipher / Block cipher / Cipher / Hill cipher / Finite field

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
18Stream ciphers / Data Encryption Standard / Message authentication codes / Cryptography / VEST / Authenticated encryption / Py / DEAL / Index of cryptography articles

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
19Stream ciphers / Nonlinear feedback shift register / Radio-frequency identification / De Bruijn sequence / De Bruijn / Linear-feedback shift register / Nicolaas Govert de Bruijn / Nonlinear system

The Search and Construction of Nonlinear Feedback Shift Registers

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-08-14 05:43:02
20

Scribe Notes: Lecture 3 COMPApplied Cryptography - Winter 2013 January 29, Stream Ciphers message {0,1}n

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:57
    UPDATE