Weak key

Results: 101



#Item
71Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: www.factorable.net

Language: English - Date: 2012-07-02 15:01:16
72Secure Shell / Key generation / RSA / X.509 / Key size / Certificate authority / Digital signature / Public key fingerprint / Ssh-keygen / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-11 15:38:00
73RC4 / Distinguishing attack / Keystream / Weak key / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

The Most Efficient Distinguishing Attack on VMPC and RC4A Yukiyasu Tsunoo1 , Teruo Saito2 , Hiroyasu Kubo2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-08 09:40:27
74Block ciphers / CRYPTON / Weak key / Key schedule / Key size / Cryptography / Advanced Encryption Standard / Key management

Organization: ESAT, K.U.Leuven, Belgium Date: Fri, 28 Aug 1998 11:36:03 +0200 (METDST) From: Johan Borst

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
75Physics / Applied mathematics / Quantum key distribution / BB84 / Qubit / No-cloning theorem / SARG04 / Decoy state / Quantum information science / Quantum cryptography / Theoretical computer science

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations Valerio Scarani1 , Antonio Ac´ın1 , Gr´egoire Ribordy2 and Nicolas Gisin1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2008-02-01 00:52:07
76XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
77Block cipher / Data Encryption Standard / Key schedule / Weak key / Ciphertext / Cryptanalysis / Linear cryptanalysis / ICE / Cipher / Cryptography / Differential cryptanalysis / Advanced Encryption Standard

Narrow-Bicliques: Cryptanalysis of Full IDEA Dmitry Khovratovich1 , Ga¨etan Leurent2 , and Christian Rechberger3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2013-05-03 05:49:35
78Railway signal / Alma Media / Journalism genres / Innovation journalism / Igor Ansoff

Paying Attention to Weak Signals – The Key Concept for Innovation Journalism

Add to Reading List

Source URL: innovationjournalism.org

Language: English - Date: 2005-07-18 13:58:16
79Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
80Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
UPDATE