|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 60 occurrences of 34 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
76 | Bart Preneel |
ECRYPT: The Cryptographic Research Challenges for the Next Decade. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
40 | |
ECRYPT Stream Cipher Project. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
40 | Jana Dittmann, Andreas Lang 0001, Martin Steinebach, Stefan Katzenbeisser 0001 |
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. |
Sicherheit |
2005 |
DBLP BibTeX RDF |
|
33 | Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima |
Distinguishing Attack Against TPypy. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM |
18 | Aleksandar Kircanski, Amr M. Youssef |
Differential Fault Analysis of Rabbit. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
18 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries |
Specification for NLSv2. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Decimv2. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Daniel J. Bernstein |
The Salsa20 Family of Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Pierre-Alain Fouque, Gaëtan Leurent |
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code |
18 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack |
18 | Xiao-Li Huang, Chuan-Kun Wu |
Cryptanalysis of Achterbahn-Version 1 and -Version 2. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM |
18 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Nicolas Fournel, Marine Minier, Stéphane Ubéda |
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
benchmarks, sensors, stream ciphers |
18 | Antoine Joux, Jean-René Reinhard |
Overtaking VEST. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
inner collision, chosen IV attack, Stream cipher |
18 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
18 | Haina Zhang, Xiaoyun Wang 0001 |
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis |
18 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
18 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
18 | Alexander Maximov |
Cryptanalysis of the "Grain" family of stream ciphers. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
decoding problem, cryptanalysis, correlation attacks, distinguisher, grain |
18 | Ali Doganaksoy, Faruk Göloglu |
On Lempel-Ziv Complexity of Sequences. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
Lempel-Ziv complexity, ?2-statistics, randomness |
18 | Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha |
Security of Jump Controlled Sequence Generators for Stream Ciphers. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch |
18 | Antoine Joux, Frédéric Muller |
Chosen-Ciphertext Attacks Against MOSQUITO. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Côme Berbain, Henri Gilbert, Alexander Maximov |
Cryptanalysis of Grain. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Correlation attack, Walsh transform |
18 | Souradyuti Paul, Bart Preneel, Gautham Sekar |
Distinguishing Attacks on the Stream Cipher Py. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Hongjun Wu 0001, Bart Preneel |
Resynchronization Attacks on WG and LEX. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack |
18 | Matthew Henricksen, Ed Dawson |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4 |
18 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
On the Effectiveness of TMTO and Exhaustive Search Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, one-way function |
18 | Frédéric Muller, Thomas Peyrin |
Linear Cryptanalysis of the TSC Family of Stream Ciphers. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jin Hong 0001, Palash Sarkar 0001 |
New Applications of Time Memory Data Tradeoffs. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
time memory data tradeoff |
18 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang |
Weaknesses of COSvd (2, 128) Stream Cipher. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer |
18 | Nicolas T. Courtois |
Cryptanalysis of Sfinks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis |
18 | Håkan Englund, Alexander Maximov |
Attack the Dragon. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|