Weak key

Results: 101



#Item
61A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:31:48
62Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
63Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
64Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:33:19
65   NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

  NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 14:12:59
66MULTINATIONAL ENTERPRISES AND PUBLIC INTEGRITY: THE ROLE OF THE OECD GUIDELINES1 Improved public governance is key to the transparency and integrity of the global system. Some zones have weak government accountability an

MULTINATIONAL ENTERPRISES AND PUBLIC INTEGRITY: THE ROLE OF THE OECD GUIDELINES1 Improved public governance is key to the transparency and integrity of the global system. Some zones have weak government accountability an

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 19:44:03
67APS/EK10599  Weak Ties: Subtle Role of Information Diffusion in Online Social Networks Jichang Zhao State Key Laboratory of Software Development Environment, Beihang University, Beijing[removed], P.R.China

APS/EK10599 Weak Ties: Subtle Role of Information Diffusion in Online Social Networks Jichang Zhao State Key Laboratory of Software Development Environment, Beihang University, Beijing[removed], P.R.China

Add to Reading List

Source URL: ipv6.nlsde.buaa.edu.cn

Language: English - Date: 2010-12-13 23:31:39
68   NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

  NEW ZEALAND   Country Highlights  OECD (2009), Doing Better for Children  Outcomes  for  New  Zealand  children  are  weak  in  several  key  areas,  according  to  the  OECD’s  first 

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2013-08-19 01:58:21
69Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-02 15:01:16
70Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28