DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Stream cipher
Stream cipher
Key Differentiation Attacks on Stream Ciphers
RC4-2S: RC4 Stream Cipher with Two State Tables
Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
Generic Attacks on Stream Ciphers
The Rc4 Stream Encryption Algorithm
Stream Cipher Designs: a Review
Analysis of Chosen Plaintext Attacks on the WAKE Stream Cipher
6.6 Case Study: A5 Stream Cipher
Stream Ciphers – an Overview
2.7.05 7.1 Stream Cipher Modes Of
Cryptanalysis Techniques for Stream Cipher: a Survey
Attacking SSL When Using RC4
Stream Ciphers Properties of Stream Ciphers
High Speed Reconfigurable Architecture for Phelix
Lecture 9: Using Block and Stream Ciphers for Secure Wired and Wifi Communications
Randomness Analysis of A5/1 Stream Cipher for Secure Mobile Communication
Design of a New Stream Cipher: PALS
RC4 Stream Cipher with a Random Initial State
Top View
A Survey on RC4 Stream Cipher
Cryptography the Basics Mathiness
1 Stream Ciphers Vs. Block Ciphers
Jump Index in T-Functions for Designing a New Basic Structure of Stream Ciphers Ali Hadipour, Seyed Mahdi Sajadieh and Raheleh Afifi
Block Cipher & the Data Encryption Standard
Stream Ciphers: a Comparative Study of Attacks and Structures
Attacks on Stream Ciphers: a Perspective
Fault Analysis of Stream Ciphers
Modes of Operation of Stream Ciphers
Module 1: Classical Symmetric Ciphers
Stream Cipher Examples, Block Cipher Introduction
Correlated Keystreams in Moustique
Stream Ciphers and Block Ciphers
The A5 Stream Cipher
The RC4 Stream Cipher
How Crypto Fails in Practice? CSS and WEP
Cryptography Lecture 3 Stream Ciphers, Random Number Generators the One Time Pad Is the Only Theoretically Secure Cipher
The Stream Cipher MICKEY (Version 1) Algorithm Specification Issue 1.0
A GSM Stream Cipher
Introduction to Cryptanalysis: Attacking Stream Ciphers
Improved Cryptanalysis of the Stream Cipher Polar Bear
Weaknesses in the Key Scheduling Algorithm Of
Comparative Analysis of Structures and Attacks on Various Stream Ciphers
Grain-128AEAD - a Lightweight AEAD Stream Cipher Cover Sheet
Lecture Notes on Stream Ciphers and RC4
Cryptanalysis of RC4-Like Ciphers
A New Guess-And-Determine Attack on the A5/1 Stream Cipher
Stream Cipher
Symmetric Key Crypto
Stream Ciphers
A5 Encryption in GSM
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
RC4 Stream Cipher and Possible Attacks on WEP
Stream Cipher Basic Problem
Enhancement of A5/1 Stream Cipher Overcoming Its Weakneses
Which Estream Ciphers Have Been Broken?
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Distinguishing Attack on the ABC V.1 and V .2
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
Analysis and Design of a Stream Cipher
Differential-Linear Attacks Against the Stream Cipher Phelix⋆
Related-Key Linear Cryptanalysis
Stream Ciphers
Cryptanalysis of Stream Cipher Grain Family *
Cryptanalysis of Stream Cipher
Stream and Block Encryption
Stream Ciphers
Simplified RC4 Example Example Steven Gordon
ABC: a New Fast Flexible Stream Cipher