Back to Results
First PageMeta Content
Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream


Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 142,09 KB

Share Result on Facebook

City

New York / /

Company

IBM / Counterpane Systems / TriStrata Corporation / /

Country

United States / /

/

Facility

University of California Berkeley / We store / Soda Hall / /

IndustryTerm

present-technology implementation / keystream generation algorithm / brute-force search / binary search / exhaustive search attack / exhaustive search / encryption algorithm / loop enciphering systems / be performed quickly using binary search / /

Organization

University of California / /

Person

David Bernier / Ross Anderson / Dan Beckman / David Kahn / Charalampos Manifavas / David Wagner / Bruce Schneier / /

Position

analyst / /

ProvinceOrState

California / /

Technology

encryption algorithm / keystream generation algorithm / given encryption / stream cipher / distribution protocol / /

URL

http /

SocialTag