The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for eSTREAM with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006 (16) 2007 (24) 2008 (40) 2009-2012 (15) 2013-2017 (4)
Publication types (Num. hits)
article(8) book(1) incollection(20) inproceedings(70)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 172 occurrences of 64 keywords

Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
107Christophe De Cannière eSTREAM Software Performance. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
107Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Tim Good, Mohammed Benaissa ASIC Hardware Performance. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Daniel J. Bernstein The Salsa20 Family of Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
84Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Salsa20, TSC-4, Chosen IV Attack, Stream Cipher, eSTREAM
77Ed Dawson, Matthew Henricksen, Leonie Simpson The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
77Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Decimv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar Authenticated Encryption in WSN Using eSTREAM Ciphers. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption
62Gordon Meiser, Thomas Eisenbarth 0001, Kerstin Lemke-Rust, Christof Paar Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. Search on Bibsonomy SIES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Xuan-Hong Dang, Wee Keong Ng, Kok-Leong Ong EStream: Online Mining of Frequent Sets with Precise Error Guarantee. Search on Bibsonomy DaWaK The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF jump register, stream cipher, Pomaranch
61Hongjun Wu 0001 The Stream Cipher HC-128. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Christophe De Cannière, Bart Preneel Trivium. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Martin Hell, Thomas Johansson 0001, Alexander Maximov, Willi Meier The Grain Family of Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries Specification for NLSv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Martin Boesgaard, Mette Vesterager, Erik Zenner The Rabbit Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stream cipher, coupled, non-linear, counter, fast
61Danilo Gligoroski, Smile Markovski, Svein J. Knapskog The Stream Cipher Edon80. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square
61Joan Daemen, Paris Kitsos The Self-synchronizing Stream Cipher Moustique. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Alex Biryukov Design of a New Stream Cipher-LEX. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61François Arnault, Thierry P. Berger, Cédric Lauradoux F-FCSR Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita CryptMT3 Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Steve Babbage, Matthew Dodd The MICKEY Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Joo Yeon Cho, Josef Pieprzyk Crossword Puzzle Attack on NLS. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, Linear Approximations, Modular Addition, NLS
46Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
38Tobias Eibach, Enrico Pilz, Gunnar Völkel Attacking Bivium Using SAT Solvers. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rsat, Bivium, Gröbner Base, Cryptography, Application, Stream Cipher, BDD, SAT Solver, eSTREAM, Trivium
38Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
38Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar Correlated Keystreams in Moustique. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Moustique, related keys, eSTREAM
38Simon Fischer 0002, Shahram Khazaei, Willi Meier Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain
38Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
38Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
38Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima Distinguishing Attack Against TPypy. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM
38Joo Yeon Cho, Josef Pieprzyk Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS
38María Naya-Plasencia Cryptanalysis of Achterbahn-128/80. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
38Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury Strengthening NLS Against Crossword Puzzle Attack. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle attack, Stream ciphers, eSTREAM, Linear Approximations, Modular Addition, NLS
31Firdous Kausar, Ayesha Naureen A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF H-128, Wireless Sensor Network (WSN), Pervasive Computing, Stream Ciphers, Rabbit
31Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Martin Hell, Thomas Johansson 0001 A Key Recovery Attack on Edon80. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Vihang Garg, Raman Adaikkalavan, Sharma Chakravarthy Extensions to Stream Processing Architecture for Supporting Event Processing. Search on Bibsonomy DEXA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31João César, Wilian Soares Lacerda, Bruno Silva Análise dos Algoritmos de Perfil II do Projeto eSTREAM para Criptografia de Imagens. Search on Bibsonomy SBSI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Minhui Zou, Kun Ma, Kaijie Wu 0001, Edwin Hsing-Mean Sha Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Sandip Karmakar, Dipanwita Roy Chowdhury A Generic Scan Attack on Hardware based eStream Winners. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
31Petr Svenda, Martin Ukrop, Vashek Matyás Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31 Breaking the Estream Finalists and AES Modes of Operation Faster than Exhaustive Search Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
31Khoongming Khoo, Chik How Tan New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Marion Videau eSTREAM. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Arshad Ali New most efficient state recovery attacks on an eSTREAM candidate F-FCSR-H v2 and F-FCSR-H stream ciphers. Search on Bibsonomy WorldCIS The full citation details ... 2011 DBLP  BibTeX  RDF
31Vincent Rijmen Stream ciphers and the eSTREAM project. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Erik Zenner Cache Timing Analysis of eStream Finalists. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2009 DBLP  BibTeX  RDF
31Matthew J. B. Robshaw, Olivier Billet (eds.) New Stream Cipher Designs - The eSTREAM Finalists Search on Bibsonomy 2008 DBLP  DOI  BibTeX  RDF
31Erik Zenner Das eStream-Projekt - Oder: Die Wiederentdeckung der Stromchiffre. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Markku-Juhani Olavi Saarinen Chosen-IV Statistical Attacks on eStream Ciphers. Search on Bibsonomy SECRYPT The full citation details ... 2006 DBLP  BibTeX  RDF
22Zainab Noferesti, Neda Rohani, Javad Mohajeri, Mohammad Reza Aref Distinguishing Attack on Bivium. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Bivium, stream cipher, distinguishing attack, eSTREAM
22Pardeep Kumar 0001, Hoon-Jae Lee 0001 A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dragon Stream Cipher, eStream Project, Telos B sensor mote, Authenticated Encryption, Sensor Network Security
22Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung A secure ubiquitous sensor network with Dragon. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security
22María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
22Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF combined generator, filter with memory, quasigroup filter, multiplicative filter, CryptMT, distribution, stream cipher, period, eSTREAM
22Paris Kitsos, Odysseas G. Koufopavlou An FPGA-based implementation of the Pomaranch stream cipher. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF eStream project, FPGA, stream cipher, hardware implementation, Pomaranch
22Håkan Englund, Martin Hell, Thomas Johansson 0001 Two General Attacks on Pomaranch-Like Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch
15Aleksandar Kircanski, Amr M. Youssef Differential Fault Analysis of Rabbit. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin Fault Analysis of Rabbit: Toward a Secret Key Leakage. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF carry analysis, Stream cipher, fault attacks, Rabbit
15Julia Borghoff, Lars R. Knudsen, Mathias Stolpe Bivium as a Mixed-Integer Linear Programming Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
15Deian Stefan, David B. Nummey, Jared Harwayne-Gidansky, Ishaan L. Dalal On Parallelizing the CryptMT Stream Cipher. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko Enocoro-80: A Hardware Oriented Stream Cipher. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Panama, stream cipher
15Meltem Sönmez Turan, Çagdas Çalik, Nurdan Buz Saran, Ali Doganaksoy New Distinguishers Based on Random Mappings against Stream Ciphers. Search on Bibsonomy SETA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random Mappings, TMTO Attacks, Stream Ciphers, Randomness tests
15Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack
15Martin Hell, Thomas Johansson 0001 Breaking the F-FCSR-H Stream Cipher in Real Time. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
15Michal Hojsík, Bohuslav Rudolf Differential Fault Analysis of Trivium. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trivium stream cipher, fault injection, differential fault analysis
15Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Michal Hojsík, Bohuslav Rudolf Floating Fault Analysis of Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher, Trivium, differential fault analysis
15Jens-Peter Kaps Chai-Tea, Cryptographic Hardware Implementations of xTEA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation
15Christophe De Cannière, Özgül Küçük, Bart Preneel Analysis of Grain's Initialization Algorithm. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
15Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Alexander Maximov, Alex Biryukov Two Trivial Attacks on Trivium. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Dirk Stegemann Extended BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain
15Nicolas Fournel, Marine Minier, Stéphane Ubéda Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarks, sensors, stream ciphers
15Simon Fischer 0002, Willi Meier Algebraic Immunity of S-Boxes and Augmented Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Augmented Function, Stream Cipher, Algebraic Attack, S-box, Trivium, Filter Generator
15Antoine Joux, Jean-René Reinhard Overtaking VEST. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inner collision, chosen IV attack, Stream cipher
15Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
15Hongjun Wu 0001, Bart Preneel Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Py, Py6, Pypy, Stream Cipher, Differential Cryptanalysis
15Haina Zhang, Xiaoyun Wang 0001 Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis
15Chuan-Wen Loe, Khoongming Khoo Side Channel Attacks on Irregularly Decimated Generators. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM
15Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar New Light-Weight Crypto Algorithms for RFID. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
15Martin Hell, Thomas Johansson 0001 Cryptanalysis of Achterbahn-Version 2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream ciphers, key recovery attack
15Ali Doganaksoy, Faruk Göloglu On Lempel-Ziv Complexity of Sequences. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Lempel-Ziv complexity, ?2-statistics, randomness
15Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha Security of Jump Controlled Sequence Generators for Stream Ciphers. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch
15Côme Berbain, Henri Gilbert, Alexander Maximov Cryptanalysis of Grain. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Correlation attack, Walsh transform
15Hongjun Wu 0001, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
15Thomas Johansson 0001, Willi Meier, Frédéric Muller Cryptanalysis of Achterbahn. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15An Braeken, Joseph Lano, Bart Preneel Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Leonie Ruth Simpson, Matthew Henricksen Improved Cryptanalysis of MAG. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery
15Matthew Henricksen, Ed Dawson Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4
15Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai Algebraic Attacks on Clock-Controlled Cascade Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #99 of 99 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license