Перевод: с хорватского на все языки

со всех языков на хорватский

keystream generator

См. также в других словарях:

  • Stream cipher — The operation of the keystream generator in A5/1, a LFSR based stream cipher used to encrypt mobile phone conversations. In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher… …   Wikipedia

  • Correlation attack — In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the output of several linear feedback shift registers (called LFSRs for the rest of this article)… …   Wikipedia

  • RC4 — In cryptography, RC4 (also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is the most widely used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to… …   Wikipedia

  • E0 (cipher) — E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 128 bits. At each iteration, E0 generates a bit… …   Wikipedia

  • Grain (cipher) — Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware …   Wikipedia

  • MUGI — [[Изображение: Файл:51210.jpg MUGI мини| 200px| изображение]] Опубликован: Февраль 2002 Размер ключа: 128 bits Число раундов: 32 MUGI это генератор псевдослучайных чис …   Википедия

  • MULTI-S01 — In cryptography, MULTI S01 (pronounced multi ess zero one ), is an encryption algorithm based on a pseudorandom number generator (PRNG). MULTI S01 is an encryption scheme preserving both confidentiality and data integrity. The scheme defines a… …   Wikipedia

  • E0 (algorithme) — E0 est un algorithme de chiffrement par flot utilisé par le protocole Bluetooth pour protéger les transmissions. Il génère une suite pseudo aléatoire avec laquelle on effectue un XOR avec les données. La clé peut avoir une taille variable mais sa …   Wikipédia en Français

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Souradyuti Paul — is an Indian cryptologist (PhD, 2006, Catholic University of Leuven, Belgium). He took part in cryptanalysis of the following ciphers among others. * RC4 * Helix * Py * Py6 * TPy * TPy6 * Pypy * TPypy His other contributions (with Bart Preneel)… …   Wikipedia

  • RC4 — (англ. Rivest Cipher 4 или англ. Ron’s Code, также известен как ARCFOUR или ARC4 (англ. Alleged RC4))  потоковый шифр, широко применяющийся в различных системах защиты информации в компьютерных сетях (например, в протоколах… …   Википедия

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»