Stream cipher

Results: 434



#Item
91

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-03 23:50:29
92

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
93Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
94Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
95Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
96Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
97A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
98Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
99Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
100Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:32:18