Tag: xor

Found 141 results for 'xor'.

1) stream-cipher - basic question regarding two-time pad attack
2) random-number-generator - RNG Source Combining
3) key-exchange - How to handle multiple key-agreements
4) diffie-hellman - Using Diffie–Hellman without a key derivation function
5) randomness - XOR a set of random numbers
6) protocol-design - SHA-256-based stream cipher
7) stream-cipher - How to attack a "many-time pad" based on what happens when an ASCII space is XORed with a letter?
8) one-time-pad - OTP with fixed plaintext
9) one-time-pad - One-time pad XOR question
10) hash - Why Might XOR's Lead to Hash Functions Lacking 2nd Pre-image Resistance?
11) aes - Help me understand how to do a crypto assignment about AES/CBC
12) one-time-pad - Is this OTP scheme safe?
13) cbc - One time pad in CBC mode?
14) hash - Hash functions to generate a one-time pad
15) hash - Why is this MAC flawed?
16) md5 - Is it a good idea to use bitwise XOR on a set of MD5 sums?
17) encryption - How secure is using a pad (using xor) on a encrypted data, for the purpose of obfuscating/hiding the underlying encryption?
18) hash - A set of key pairs and one hash to secure them
19) xor - Combining several symmetric ciphers using XOR
20) secret-sharing - XOR secret sharing scheme
21) encryption - Weakness of XORing random bytes with secret key
22) xor - Why is a known-plaintext attack considered a complete break?
23) xor - Encryption algorithms and the "One-Time pad"
24) stream-cipher - How to attack a "many-time pad" based on what happens when an ASCII space is XORed with a letter?
25) stream-cipher - Is a simple stream cipher "partially homomorphic" if no integrity check is applied?
26) secret-sharing - Is there an efficient 2 out of 3 secret sharing scheme based on XOR?
27) encryption - Using Whirlpool hashing function to encrypt data
28) aes - Are block ciphers vulnerable to “key reuse” and/or “bit-flipping” attacks?
29) encryption - Is it safe to use XOR to encrypt data key using master key
30) xor - (Non-) Perfect Secrecy of Vernam Cipher Using $E(m) = m \oplus k \oplus \operatorname{rev}(k)$
31) encryption - What is wrong with XOR encryption with secure PRNG?
32) encryption - Reducing the keyspace for a brute force attack on a chained 64-bit xor
33) encryption - XOR cipher Pseudo-random key strength
34) cbc - Decrypt simple CBC message with known IV using XOR encryption
35) xor - What's the number of unique possible Cayley tables in a 16*16 grid for XOR'ing single hex characters?
36) block-cipher - Using Hadamard Form of a Matrix in the Block Cipher
37) encryption - What makes an open source encryption algorithm safe?
38) encryption - How secure is XOR-CBC?
39) implementation - Reducing the XOR's in Implementation Cost
40) hash - is XOR-hash difference-unpredictable
41) cbc - Decrypt simple CBC with XOR
42) encryption - XOR cipher for encrypting compiled C code
43) hash - Can I use PBKDF2 as a stream cipher?
44) one-time-pad - How to decrypt two images encrypted using XOR with the same key?
45) randomness - If you XOR a random input with a biased input, the output is random - why?
46) algorithm-design - Can I safely replace XOR with ADD in a stream cipher?
47) block-cipher - Is this "layered" XOR cipher secure?
48) secret-sharing - Example of a Two-party GMW Protocol
49) hash - Security of a sha-256 based stream xor cipher?
50) encryption - What are linear and non-linear elements in cryptography?