Introduction Cryptology Basics Detection Cryptanalysis The Word Case The Excel Case Conclusion
How to Operationally Detect the Misuse of Stream Ciphers (and even Block Ciphers Sometimes) and Break them
Eric Filiol, filiol@esiea.fr
ESIEA - Laval Operational Cryptology and Virology Lab (C + V )O http://www.esiea-recherche.eu/
Black Hat Europe 2010
- E. Filiol (Esiea - (C + V )O lab)
Black Hat Europe 2010 1 / 64