|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 23 occurrences of 17 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Pey-Chang Kent Lin, Sunil P. Khatri |
VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
NLFSR, stream cipher, pseudo-random sequence |
89 | Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap |
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers |
89 | Alexander Maximov |
Cryptanalysis of the "Grain" family of stream ciphers. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
decoding problem, cryptanalysis, correlation attacks, distinguisher, grain |
66 | Elena Dubrova, Maxim Teslenko, Hannu Tenhunen |
On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Matthew Henricksen, Ed Dawson |
Rekeying Issues in the MUGI Stream Cipher. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
MUGI, MUGI-M, key initialization, key agility, stream cipher |
44 | Håkan Englund, Alexander Maximov |
Attack the Dragon. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
29 | Punam Kumari, Bhaskar Mondal |
Lightweight encryption with data and device integrity using NLFSR and PUF for the Internet of Medical Things. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Punam Kumari, Bhaskar Mondal |
Lightweight image encryption algorithm using NLFSR and CBC mode. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul 0001 |
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
29 | Amit Jana, Mostafizar Rahman, Dhiman Saha |
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
29 | Yujuan Li, Huaifu Wang, Peipei Zhou 0004, Guoshuang Zhang |
Some properties of the cycle decomposition of WG-NLFSR. |
Adv. Math. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Ge Yao, Udaya Parampalli |
Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers. |
Cryptogr. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Zhaohui Xing, Wenying Zhang, Guoyong Han |
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP. |
Wirel. Commun. Mob. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Ibraheem Al-Hejri, Sultan Almuhammadi |
Constructing New NLFSR Functions with Optimal Periods. |
Int. J. Interdiscip. Telecommun. Netw. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Ge Yao |
Transformation and Security Analysis of NLFSR-based Stream Ciphers. |
|
2020 |
RDF |
|
29 | Ge Yao, Udaya Parampalli |
Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
29 | Sultan Almuhammadi, Ibraheem Al-Hejri, Ghashmi Bin Talib, Awadh Gaamel |
NLFSR Functions with Optimal Periods. |
ICCSA (1) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Navaneetha Krishna, V. Murugappan, R. Harish, M. Midhun, E. Prabhu |
Design of a novel reversible nlfsr. |
ICACCI |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Reza Sabbaghi-Nadooshan, Zahra Shahosseini, Davood Rezaeipour |
Design of New QCA LFSR and NLFSR for Grain-128 Stream Cipher. |
J. Circuits Syst. Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Yuhei Watanabe, Yosuke Todo, Masakatu Morii |
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. |
AsiaJCIS |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Yujuan Li, Wenhua Shen, Huaifu Wang, Peipei Zhou 0004 |
On the cycle decomposition of the WG-NLFSR. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
29 | Guangyao Zhao, Lei Cheng, Chao Li 0002, Ruilin Li, Xuan Shen |
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. |
ProvSec |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Zhiqiang Lin |
The Transformation from the Galois NLFSR to the Fibonacci Configuration. |
EIDWT |
2013 |
DBLP DOI BibTeX RDF |
|
29 | |
The Transformation from the Galois NLFSR to the Fibonacci Configuration. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
29 | Xu Guo, Xu Na |
A research of the Port-Hopping telecommunication techniques based on non-linear feedback shift register (NLFSR). |
ICAL |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jean-Michel Chabloz, Shohreh Sharif Mansouri, Elena Dubrova |
An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence. |
SETA |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Simon Knellwolf, Willi Meier, María Naya-Plasencia |
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Wenling Wu, Lei Zhang 0012, Liting Zhang, Wentao Zhang |
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
29 | Elena Dubrova |
How to speed-up your NLFSR-based stream cipher. |
DATE |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Wenling Wu, Lei Zhang 0012, Liting Zhang, Wentao Zhang |
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. |
ICICS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Berndt M. Gammel, Rainer Göttfert, O. Kniffler |
An NLFSR-based stream cipher. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
22 | Xiao-Li Huang, Chuan-Kun Wu |
Cryptanalysis of Achterbahn-Version 1 and -Version 2. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM |
22 | Andrey Bogdanov |
Linear Slide Attacks on the KeeLoq Block Cipher. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks |
22 | Giorgos Dimitrakopoulos, Dimitris Nikolos, Dimitris Bakalis |
Bit-Serial Test Pattern Generation by an Accumulator Behaving as a Non-Linear Feedback Shift Register. |
IOLTW |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Yves Roggeman |
Varying Feedback Shift Registers. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|