Stream cipher

Results: 434



#Item
81

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
82Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1  University of Passau, Germany

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
83J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER  Introduction to differential power analysis

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
84USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
85CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-01-19 20:59:56
86Heraclitus A LFSR based Stream Cipher with Key Dependent Structure Bernard Colbert Deakin University

Heraclitus A LFSR based Stream Cipher with Key Dependent Structure Bernard Colbert Deakin University

Add to Reading List

Source URL: members.ozemail.com.au

Language: English - Date: 2011-02-16 21:05:29
87Supporting Online Problem-Solving Communities with the Semantic Web Anupriya Ankolekar University of Karlsruhe Katia Sycara

Supporting Online Problem-Solving Communities with the Semantic Web Anupriya Ankolekar University of Karlsruhe Katia Sycara

Add to Reading List

Source URL: www2006.org

Language: English - Date: 2006-09-05 12:42:59
88CIS 331 Introduction to Networks & Security January 21, 2014 Homework 1: Threat Modeling and Cryptanalysis

CIS 331 Introduction to Networks & Security January 21, 2014 Homework 1: Threat Modeling and Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
89On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
90Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-30 18:34:48