-
1
-
-
37149052678
-
SOSEMANUK: A fast oriented software-oriented stream cipher
-
C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. SOSEMANUK: a fast oriented software-oriented stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2005. http : //www. ecrypt. eu.org/stream/.
-
(2005)
ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase
, vol.2
-
-
Berbain, C.1
Billet, O.2
Canteaut, A.3
Courtois, N.4
Gilbert, H.5
Goubin, L.6
Gouget, A.7
Granboulan, L.8
Lauradoux, C.9
Minier, M.10
Pornin, T.11
Sibert, H.12
-
4
-
-
37149010097
-
-
Eli Biham and Jennifer Seberry. Pypy: Another version of py. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2006. http ://www.ecrypt.eu.org/stream/.
-
Eli Biham and Jennifer Seberry. Pypy: Another version of py. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2006. http ://www.ecrypt.eu.org/stream/.
-
-
-
-
6
-
-
37149037308
-
-
C. De Cannière. estream optimized code HOWTO. eSTREAM, ECRYPT Stream Cipher Project, 2005. http://www.ecrypt.eu.org/stream/perf/.
-
C. De Cannière. estream optimized code HOWTO. eSTREAM, ECRYPT Stream Cipher Project, 2005. http://www.ecrypt.eu.org/stream/perf/.
-
-
-
-
7
-
-
37149005704
-
An observation on dragon. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/002
-
Joo Yeon Cho. An observation on dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/002, 2007. http://www.ecrypt.eu.org/stream.
-
(2007)
-
-
Yeon Cho, J.1
-
8
-
-
84937397479
-
Cryptanalysis of stream ciphers with linear masking
-
Moti Yung, editor, CRYPTO, of, Springer
-
Don Coppersmith, Shai Halevi, and Charanjit S. Jutla. Cryptanalysis of stream ciphers with linear masking. In Moti Yung, editor, CRYPTO, volume 2442 of Lecture Notes in Computer Science, pages 515-532. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 515-532
-
-
Coppersmith, D.1
Halevi, S.2
Jutla, C.S.3
-
9
-
-
46449139682
-
Improved cryptanalysis of py. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/010
-
Paul Crowley. Improved cryptanalysis of py. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/010, 2006. http://www.ecrypt.eu.org/stream.
-
(2006)
-
-
Crowley, P.1
-
10
-
-
37149050381
-
Dragon: A fast word based stream cipher
-
Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Lee, and SangJae Moon. Dragon: A fast word based stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2005. http://www.ecrypt.eu.org/stream/.
-
(2005)
ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase
, vol.2
-
-
Dawson, E.1
Chen, K.2
Henricksen, M.3
Millan, W.4
Simpson, L.5
Lee, H.6
Moon, S.7
-
12
-
-
35248828702
-
A new version of the stream cipher SNOW
-
Selected Areas in Cryptography, SAC 2002, of, Springer-Verlag
-
P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In Selected Areas in Cryptography - SAC 2002, volume 2295 of Lecture Notes in Computer Science, pages 47-61. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2295
, pp. 47-61
-
-
Ekdahl, P.1
Johansson, T.2
-
13
-
-
37149052039
-
Attack the dragon. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/062
-
Hakan Englund and Alexander Maximov. Attack the dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/062, 2005. http : //www. ecrypt. eu.org/stream.
-
(2005)
-
-
Englund, H.1
Maximov, A.2
-
14
-
-
37149050496
-
-
FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, 2001. U.S. Department of Commerce/N.I.S.T.
-
FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, 2001. U.S. Department of Commerce/N.I.S.T.
-
-
-
-
15
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of rc4
-
Selected Areas in Cryptography -SAC 2001, of, Springer-Verlag
-
S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of rc4. In Selected Areas in Cryptography -SAC 2001, volume 2259 of Lecture Notes in Computer Science, pages 1-24. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
16
-
-
37149012236
-
Booting and Porting Linux and uClinux on a new platform. Research Report RR2006-08, LIP - ENS Lyon
-
Feb
-
N. Fournel, A. Fraboulet, and P. Feautrier. Booting and Porting Linux and uClinux on a new platform. Research Report RR2006-08, LIP - ENS Lyon, Feb 2006.
-
(2006)
-
-
Fournel, N.1
Fraboulet, A.2
Feautrier, P.3
-
17
-
-
24944553900
-
Guess-and-determine attacks on SNOW
-
Selected Areas in Cryptography -SAC 2002, of, Springer-Verlag
-
P. Hawkes and G. Rose. Guess-and-determine attacks on SNOW. In Selected Areas in Cryptography -SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 37-46. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 37-46
-
-
Hawkes, P.1
Rose, G.2
-
19
-
-
37148999897
-
How to break py and pypy by a chosen-iv attack. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/060
-
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii. How to break py and pypy by a chosen-iv attack. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/060, 2006. http://www.ecrypt.eu.org/stream.
-
(2006)
-
-
Isobe, T.1
Ohigashi, T.2
Kuwakado, H.3
Morii, M.4
-
20
-
-
37149016266
-
-
Available online, nov
-
Available online, http://kcachegrind.sourceforge.net/, nov 2006.
-
(2006)
-
-
-
21
-
-
37149034236
-
-
RSA laboratories. Rsa security response to weaknesses in key scheduling algorithm of rc4. available at http://www.rsasecurity.com/rsalabs/node.asp?id= 2009, 2007.
-
RSA laboratories. Rsa security response to weaknesses in key scheduling algorithm of rc4. available at http://www.rsasecurity.com/rsalabs/node.asp?id= 2009, 2007.
-
-
-
-
22
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
65-93
-
Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw., 2(1):65-93, 2006.
-
(2006)
ACM Trans. Sen. Netw
, vol.2
, Issue.1
-
-
Wei Law, Y.1
Doumen, J.2
Hartel, P.3
-
23
-
-
84958972140
-
A practical attack on broadcast rc4
-
Fast Software Encryption, FSE 2001, of, Springer-Verlag
-
I. Manti and A. Shamir. A practical attack on broadcast rc4. In Fast Software Encryption - FSE 2001, volume 2335 of Lecture Notes in Computer Science, pages 152-164. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2335
, pp. 152-164
-
-
Manti, I.1
Shamir, A.2
-
24
-
-
33646812220
-
A practical attack on the fixed rc4 in the wep mode
-
Bimal K. Roy, editor, ASIACRYPT, of, Springer
-
Itsik Mantin. A practical attack on the fixed rc4 in the wep mode. In Bimal K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 395-411. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 395-411
-
-
Mantin, I.1
-
25
-
-
24944554565
-
Predicting and distinguishing attacks on rc4 keystream generator
-
Ronald Cramer, editor, EUROCRYPT, of, Springer
-
Itsik Mantin. Predicting and distinguishing attacks on rc4 keystream generator. In Ronald Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 491-506. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
28
-
-
33746753311
-
-
Souradyuti Paul, Bart Preneel, and Gautham Sekar. Distinguishing attacks on the stream cipher py. In Matthew J. B. Robshaw, editor, FSE, 4047 of Lecture Notes in Computer Science, pages 405-421. Springer, 2006.
-
Souradyuti Paul, Bart Preneel, and Gautham Sekar. Distinguishing attacks on the stream cipher py. In Matthew J. B. Robshaw, editor, FSE, volume 4047 of Lecture Notes in Computer Science, pages 405-421. Springer, 2006.
-
-
-
-
29
-
-
37149008575
-
Lightweight Implementation of the POSIX Threads API for an On-Chip MIPS Multiprocessor with VCI Interconnect
-
Frédéric Pétrot and Pascal Gomez. Lightweight Implementation of the POSIX Threads API for an On-Chip MIPS Multiprocessor with VCI Interconnect. In DATE 03 Embedded Software Forum, pages 51-56, 2003.
-
(2003)
DATE 03 Embedded Software Forum
, pp. 51-56
-
-
Pétrot, F.1
Gomez, P.2
-
30
-
-
31144479254
-
The RC4 encryption algorithm
-
R. Rivest. The RC4 encryption algorithm. RSA Data Security, 1992.
-
(1992)
RSA Data Security
-
-
Rivest, R.1
-
31
-
-
37149043679
-
-
Available online, nov, http://www.skyeye.org
-
Available online, http://www.skyeye.Org/http://www.skyeye.org/, nov 2006.
-
(2006)
-
-
-
32
-
-
33746729581
-
A distinguishing attack of SNOW 2.0 with linear masking method
-
Selected Areas in Cryptography 2003, of, Springer-Verlag
-
D. Watanabe, A. Biryukov, and C. De Cannire. A distinguishing attack of SNOW 2.0 with linear masking method. In Selected Areas in Cryptography 2003, volume 3006 of Lecture Notes in Computer Science, pages 222-233. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.3006
, pp. 222-233
-
-
Watanabe, D.1
Biryukov, A.2
De Cannire, C.3
-
33
-
-
85044076420
-
Phelix - fast encryption and authentication in a single cryptographic primitive
-
Doug Whiting, Bruce Schneier, Stephan Lucks, and Frédéric Muller. Phelix - fast encryption and authentication in a single cryptographic primitive. ECRYPT Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2005. http ://www.ecrypt.eu.org/stream/.
-
(2005)
ECRYPT Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase
, vol.2
-
-
Whiting, D.1
Schneier, B.2
Lucks, S.3
Muller, F.4
-
36
-
-
62349094225
-
Attacking the iv setup of stream cipher lex. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/059
-
Hongjun Wu and Bart Preneel. Attacking the iv setup of stream cipher lex. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/059, 2005. http://www. ecrypt.eu.org/stream.
-
(2005)
-
-
Wu, H.1
Preneel, B.2
-
37
-
-
37149015310
-
Differential-linear attacks against the stream cipher phelix. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/056
-
Hongjun Wu and Bart Preneel. Differential-linear attacks against the stream cipher phelix. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/056, 2006. http ://www.ecrypt.eu.org/stream.
-
(2006)
-
-
Wu, H.1
Preneel, B.2
-
38
-
-
37149027724
-
Key recovery attack on py and pypy with chosen ivs. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/052
-
Hongjun Wu and Bart Preneel. Key recovery attack on py and pypy with chosen ivs. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/052, 2006. http ://www.ecrypt.eu.org/stream.
-
(2006)
-
-
Wu, H.1
Preneel, B.2
|