-
1
-
-
38349035287
-
Security Models and Notions for Stream Ciphers
-
C. Mitchell, ed, Oxford: Clarendon Press
-
R.A. Rueppel, "Security Models and Notions for Stream Ciphers", Cryptography and Coding II, C. Mitchell, ed., Oxford: Clarendon Press, 1992.
-
(1992)
Cryptography and Coding II
-
-
Rueppel, R.A.1
-
3
-
-
38949131401
-
-
Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, 01/01/1996.
-
Bruce Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, 01/01/1996.
-
-
-
-
4
-
-
84937740421
-
Shift-Register Synthesis and BCH Decoding
-
Jan
-
J.L. Massey, "Shift-Register Synthesis and BCH Decoding", IEEE Transactions on Information Theory, v. IT-15, n. 1, Jan 1969, pp. 122-127.
-
(1969)
IEEE Transactions on Information Theory
, vol.IT-15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
5
-
-
38949113090
-
The Misuse of RC4 in Microsoft Word and Excel
-
Singapore
-
Hongjun Wu, "The Misuse of RC4 in Microsoft Word and Excel", Institute for Infocomm Research, Singapore.
-
Institute for Infocomm Research
-
-
Hongjun, W.1
-
6
-
-
38949203978
-
-
S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001.
-
S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001.
-
-
-
-
7
-
-
38949176938
-
Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)
-
A, Month 20YY
-
ADAM STUBBLEFIELD, JOHN IOANNIDIS, AVIEL D. RUBIN, A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP), ACM Journal Name, Vol. V, No. N, Month 20YY.
-
ACM Journal Name
, vol.5
-
-
STUBBLEFIELD, A.1
IOANNIDIS, J.2
RUBIN, A.D.3
-
9
-
-
38949121864
-
A Synchronous Stream Cipher from Hash Functions, Obsidis (www.obsidis.org), ZDNET, secguru.com
-
Feb 17th
-
Angelo P. E. Rosiello, Roberto Carrozzo, ARC: A Synchronous Stream Cipher from Hash Functions, Obsidis (www.obsidis.org), ZDNET, secguru.com, Feb 17th 2006.
-
(2006)
-
-
Angelo, P.1
Rosiello, E.2
Roberto Carrozzo, A.R.C.3
-
10
-
-
38949113942
-
-
Federal Information Processing Standards Publication 180-2, August
-
SECURE HASH STANDARD, Federal Information Processing Standards Publication 180-2, August 2002.
-
(2002)
-
-
HASH STANDARD, S.1
-
12
-
-
38949205119
-
-
Arani Dasgupta, Analysis of Different Types of Attacks on Stream Ciphers and Evaluation and Security of Stream Ciphers,http://www. securitydocs.com/library/3235, 04/27/2005.
-
Arani Dasgupta, Analysis of Different Types of Attacks on Stream Ciphers and Evaluation and Security of Stream Ciphers,http://www. securitydocs.com/library/3235, 04/27/2005.
-
-
-
-
13
-
-
38949190835
-
-
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, May 15, 2001
-
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, May 15, 2001.
-
-
-
|