|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 172 occurrences of 64 keywords
|
|
|
Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
107 | Christophe De Cannière |
eSTREAM Software Performance. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
107 | Matthew Robshaw |
The eSTREAM Project. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Tim Good, Mohammed Benaissa |
ASIC Hardware Performance. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Daniel J. Bernstein |
The Salsa20 Family of Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw |
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Salsa20, TSC-4, Chosen IV Attack, Stream Cipher, eSTREAM |
77 | Ed Dawson, Matthew Henricksen, Leonie Simpson |
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
77 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Decimv2. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar |
Authenticated Encryption in WSN Using eSTREAM Ciphers. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption |
62 | Gordon Meiser, Thomas Eisenbarth 0001, Kerstin Lemke-Rust, Christof Paar |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. |
SIES |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Xuan-Hong Dang, Wee Keong Ng, Kok-Leong Ong |
EStream: Online Mining of Frequent Sets with Precise Error Guarantee. |
DaWaK |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha |
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
jump register, stream cipher, Pomaranch |
61 | Hongjun Wu 0001 |
The Stream Cipher HC-128. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Christophe De Cannière, Bart Preneel |
Trivium. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Martin Hell, Thomas Johansson 0001, Alexander Maximov, Willi Meier |
The Grain Family of Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries |
Specification for NLSv2. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Martin Boesgaard, Mette Vesterager, Erik Zenner |
The Rabbit Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
Stream cipher, coupled, non-linear, counter, fast |
61 | Danilo Gligoroski, Smile Markovski, Svein J. Knapskog |
The Stream Cipher Edon80. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square |
61 | Joan Daemen, Paris Kitsos |
The Self-synchronizing Stream Cipher Moustique. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Alex Biryukov |
Design of a New Stream Cipher-LEX. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | François Arnault, Thierry P. Berger, Cédric Lauradoux |
F-FCSR Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita |
CryptMT3 Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Steve Babbage, Matthew Dodd |
The MICKEY Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Joo Yeon Cho, Josef Pieprzyk |
Crossword Puzzle Attack on NLS. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, Linear Approximations, Modular Addition, NLS |
46 | Orr Dunkelman, Nathan Keller |
A New Attack on the LEX Stream Cipher. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
stream cipher design, AES, LEX |
38 | Tobias Eibach, Enrico Pilz, Gunnar Völkel |
Attacking Bivium Using SAT Solvers. |
SAT |
2008 |
DBLP DOI BibTeX RDF |
Rsat, Bivium, Gröbner Base, Cryptography, Application, Stream Cipher, BDD, SAT Solver, eSTREAM, Trivium |
38 | Deike Priemuth-Schmid, Alex Biryukov |
Slid Pairs in Salsa20 and Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium |
38 | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar |
Correlated Keystreams in Moustique. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Moustique, related keys, eSTREAM |
38 | Simon Fischer 0002, Shahram Khazaei, Willi Meier |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain |
38 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack |
38 | Xiao-Li Huang, Chuan-Kun Wu |
Cryptanalysis of Achterbahn-Version 1 and -Version 2. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM |
38 | Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima |
Distinguishing Attack Against TPypy. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM |
38 | Joo Yeon Cho, Josef Pieprzyk |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS |
38 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
38 | Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury |
Strengthening NLS Against Crossword Puzzle Attack. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle attack, Stream ciphers, eSTREAM, Linear Approximations, Modular Addition, NLS |
31 | Firdous Kausar, Ayesha Naureen |
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
H-128, Wireless Sensor Network (WSN), Pervasive Computing, Stream Ciphers, Rabbit |
31 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Martin Hell, Thomas Johansson 0001 |
A Key Recovery Attack on Edon80. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Vihang Garg, Raman Adaikkalavan, Sharma Chakravarthy |
Extensions to Stream Processing Architecture for Supporting Event Processing. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
31 | João César, Wilian Soares Lacerda, Bruno Silva |
Análise dos Algoritmos de Perfil II do Projeto eSTREAM para Criptografia de Imagens. |
SBSI |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Minhui Zou, Kun Ma, Kaijie Wu 0001, Edwin Hsing-Mean Sha |
Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists. |
J. Comput. Sci. Technol. |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Sandip Karmakar, Dipanwita Roy Chowdhury |
A Generic Scan Attack on Hardware based eStream Winners. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
31 | Petr Svenda, Martin Ukrop, Vashek Matyás |
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. |
ICETE (Selected Papers) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | |
Breaking the Estream Finalists and AES Modes of Operation Faster than Exhaustive Search |
CoRR |
2012 |
DBLP BibTeX RDF |
|
31 | Khoongming Khoo, Chik How Tan |
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. |
AsiaCCS |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Marion Videau |
eSTREAM. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Arshad Ali |
New most efficient state recovery attacks on an eSTREAM candidate F-FCSR-H v2 and F-FCSR-H stream ciphers. |
WorldCIS |
2011 |
DBLP BibTeX RDF |
|
31 | Vincent Rijmen |
Stream ciphers and the eSTREAM project. |
ISC Int. J. Inf. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Erik Zenner |
Cache Timing Analysis of eStream Finalists. |
Symmetric Cryptography |
2009 |
DBLP BibTeX RDF |
|
31 | Matthew J. B. Robshaw, Olivier Billet (eds.) |
New Stream Cipher Designs - The eSTREAM Finalists |
|
2008 |
DBLP DOI BibTeX RDF |
|
31 | Erik Zenner |
Das eStream-Projekt - Oder: Die Wiederentdeckung der Stromchiffre. |
Datenschutz und Datensicherheit |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Markku-Juhani Olavi Saarinen |
Chosen-IV Statistical Attacks on eStream Ciphers. |
SECRYPT |
2006 |
DBLP BibTeX RDF |
|
22 | Zainab Noferesti, Neda Rohani, Javad Mohajeri, Mohammad Reza Aref |
Distinguishing Attack on Bivium. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Bivium, stream cipher, distinguishing attack, eSTREAM |
22 | Pardeep Kumar 0001, Hoon-Jae Lee 0001 |
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Dragon Stream Cipher, eStream Project, Telos B sensor mote, Authenticated Encryption, Sensor Network Security |
22 | Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung |
A secure ubiquitous sensor network with Dragon. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security |
22 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
22 | Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita |
A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
combined generator, filter with memory, quasigroup filter, multiplicative filter, CryptMT, distribution, stream cipher, period, eSTREAM |
22 | Paris Kitsos, Odysseas G. Koufopavlou |
An FPGA-based implementation of the Pomaranch stream cipher. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
eStream project, FPGA, stream cipher, hardware implementation, Pomaranch |
22 | Håkan Englund, Martin Hell, Thomas Johansson 0001 |
Two General Attacks on Pomaranch-Like Keystream Generators. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch |
15 | Aleksandar Kircanski, Amr M. Youssef |
Differential Fault Analysis of Rabbit. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin |
Fault Analysis of Rabbit: Toward a Secret Key Leakage. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
carry analysis, Stream cipher, fault attacks, Rabbit |
15 | Julia Borghoff, Lars R. Knudsen, Mathias Stolpe |
Bivium as a Mixed-Integer Linear Programming Problem. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
15 | Deian Stefan, David B. Nummey, Jared Harwayne-Gidansky, Ishaan L. Dalal |
On Parallelizing the CryptMT Stream Cipher. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko |
Enocoro-80: A Hardware Oriented Stream Cipher. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Panama, stream cipher |
15 | Meltem Sönmez Turan, Çagdas Çalik, Nurdan Buz Saran, Ali Doganaksoy |
New Distinguishers Based on Random Mappings against Stream Ciphers. |
SETA |
2008 |
DBLP DOI BibTeX RDF |
Random Mappings, TMTO Attacks, Stream Ciphers, Randomness tests |
15 | Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park |
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack |
15 | Martin Hell, Thomas Johansson 0001 |
Breaking the F-FCSR-H Stream Cipher in Real Time. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
15 | Michal Hojsík, Bohuslav Rudolf |
Differential Fault Analysis of Trivium. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Trivium stream cipher, fault injection, differential fault analysis |
15 | Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Michal Hojsík, Bohuslav Rudolf |
Floating Fault Analysis of Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
stream cipher, Trivium, differential fault analysis |
15 | Jens-Peter Kaps |
Chai-Tea, Cryptographic Hardware Implementations of xTEA. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation |
15 | Christophe De Cannière, Özgül Küçük, Bart Preneel |
Analysis of Grain's Initialization Algorithm. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
15 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Maximov, Alex Biryukov |
Two Trivial Attacks on Trivium. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Dirk Stegemann |
Extended BDD-Based Cryptanalysis of Keystream Generators. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain |
15 | Nicolas Fournel, Marine Minier, Stéphane Ubéda |
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
benchmarks, sensors, stream ciphers |
15 | Simon Fischer 0002, Willi Meier |
Algebraic Immunity of S-Boxes and Augmented Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Augmented Function, Stream Cipher, Algebraic Attack, S-box, Trivium, Filter Generator |
15 | Antoine Joux, Jean-René Reinhard |
Overtaking VEST. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
inner collision, chosen IV attack, Stream cipher |
15 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
15 | Hongjun Wu 0001, Bart Preneel |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Py, Py6, Pypy, Stream Cipher, Differential Cryptanalysis |
15 | Haina Zhang, Xiaoyun Wang 0001 |
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis |
15 | Chuan-Wen Loe, Khoongming Khoo |
Side Channel Attacks on Irregularly Decimated Generators. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM |
15 | Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar |
New Light-Weight Crypto Algorithms for RFID. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
15 | Martin Hell, Thomas Johansson 0001 |
Cryptanalysis of Achterbahn-Version 2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream ciphers, key recovery attack |
15 | Ali Doganaksoy, Faruk Göloglu |
On Lempel-Ziv Complexity of Sequences. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
Lempel-Ziv complexity, ?2-statistics, randomness |
15 | Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha |
Security of Jump Controlled Sequence Generators for Stream Ciphers. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch |
15 | Côme Berbain, Henri Gilbert, Alexander Maximov |
Cryptanalysis of Grain. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Correlation attack, Walsh transform |
15 | Hongjun Wu 0001, Bart Preneel |
Resynchronization Attacks on WG and LEX. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack |
15 | Thomas Johansson 0001, Willi Meier, Frédéric Muller |
Cryptanalysis of Achterbahn. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
15 | An Braeken, Joseph Lano, Bart Preneel |
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Leonie Ruth Simpson, Matthew Henricksen |
Improved Cryptanalysis of MAG. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery |
15 | Matthew Henricksen, Ed Dawson |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4 |
15 | Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai |
Algebraic Attacks on Clock-Controlled Cascade Ciphers. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #99 of 99 (100 per page; Change: )
|
|