Back to Results
First PageMeta Content
Grain / Block cipher / A5/1 / RC4 / Symmetric-key algorithm / MICKEY / Linear feedback shift register / E0 / Alternating step generator / Cryptography / Stream ciphers / Correlation attack


Document Date: 2010-09-23 01:41:45


Open Document

File Size: 741,88 KB

Share Result on Facebook

City

Brisbane / Glasgow / /

Company

eSTREAM / /

Country

Oman / Russia / United States / Scotland / India / /

Event

FDA Phase / /

Facility

Information Technology Queensland University of Technology November / Royal Holloway University of London / Strathclyde University / /

Holiday

Assumption / /

IndustryTerm

digital telecommunications / important tools / step algorithm / mathematical software / polynomial time algorithms / symmetric encryption algorithm / telecommunication applications / cipher algorithm / mobile telephony / exhaustive key search attack / satellite communications / bit search generator / exhaustive key search / resynchronisation algorithm / telecommunication systems / wireless networks / efficient encryption algorithm / voice and data communication / encryption algorithms / initialization algorithm / secure online transactions / polynomial computing resources / real time applications / encryption algorithm / wireless communication / re-keying algorithm / /

Organization

Royal Holloway University of London / Queensland University of Technology / Introduction Chapter / NESSIE / Philosophy Information Security Institute Faculty / Strathclyde University / Omani government / R1 Clock Control Unit / /

Person

Bill Millan / Joo Yeon Cho / Stream Ciphers / Leonie Simpson / Beth / Tanja Lange / Bernard Colbert / Al-Hinai Bachelor / Sultan Zayid Mohammed Al-Hinai / Matt Henricksen / Josef Pieprzyk / Hovard Molland / Kenneth Wong / Yahya Al-Rawahi / Beth Piper / Sultan Zayid Al-Hinai / Said Faraj Al-Rabia / Hamed Al-Rawahi / Lynn Batten / Ed Dawson / /

Position

principal supervisor / Professor / /

Product

LFSRs / eSTREAM / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Alpha / 90 6.1 Algorithm / 39 3.2 Algorithm / symmetric encryption algorithm / 40 41 Algorithm / encryption algorithms / TV encryption / 47 53 3.7 3.8 Algorithm / encryption algorithm / Information Technology / efficient encryption / key initialization algorithm / resynchronisation algorithm / 6.2 Algorithm / streaming video / secret key / Pay TV / 114 7.3 Algorithm / 112 Algorithm / second encryption / cipher algorithm / encryption / public key / efficient encryption algorithm / re-keying algorithm / voice encryption / recent GSM encryption algorithm / 18 2.2 2.3 Algorithm / GSM / polynomial time algorithms / 28 30 2.6 2.7 Precomputation step algorithm / Bluetooth / 21 25 2.4 2.5 Algorithm / mobile telephony / stream cipher / satellite communications / /

SocialTag