-
1
-
-
84867937546
-
A new 128 bit key stream cipher : LEX. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/013
-
Biryukov, A.: A new 128 bit key stream cipher : LEX. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/013 (2005), http://www.ecrypt.eu.org/stream
-
(2005)
-
-
Biryukov, A.1
-
2
-
-
38149053610
-
-
Biryukov, A.: The Design of a Stream Cipher LEX. In: Biham, E., Youssef, A. (eds.) Selected Areas in Cryptography - SAC 2006, LNCS, 4356, Springer, Heidelberg (to appear, 2007)
-
Biryukov, A.: The Design of a Stream Cipher LEX. In: Biham, E., Youssef, A. (eds.) Selected Areas in Cryptography - SAC 2006, LNCS, vol. 4356, Springer, Heidelberg (to appear, 2007)
-
-
-
-
3
-
-
84937418785
-
Why Textbook ElGamal and RSA Encryption are Insecure
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Boneh, D., Joux, A., Nguyen, P.: Why Textbook ElGamal and RSA Encryption are Insecure. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 30-43. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 30-43
-
-
Boneh, D.1
Joux, A.2
Nguyen, P.3
-
4
-
-
84957643546
-
Differential Collisions in SHA-0
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
5
-
-
38149022082
-
Cryptanalysis of Pomaranch. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/060
-
Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/060 (2005) http://www.ecrypt.eu.org/ stream
-
(2005)
-
-
Cid, C.1
Gilbert, H.2
Johansson, T.3
-
6
-
-
38149016456
-
-
ECRYPT, ECRYPT Stream Cipher Project, IST-2002-507932
-
ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932, http://www.ecrypt.eu.org/stream
-
eSTREAM
-
-
-
7
-
-
38149105239
-
Cryptanalysis of ECRYPT Candidates F-FCSR-8 and F-FCSR-H. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/046
-
Jaulmes, E., Muller, F.: Cryptanalysis of ECRYPT Candidates F-FCSR-8 and F-FCSR-H. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/046 (2005), http://www.ecrypt.eu.org/stream
-
(2005)
-
-
Jaulmes, E.1
Muller, F.2
-
8
-
-
84893553748
-
VEST - Hardware-Dedicated Stream Ciphers. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/032
-
O'Neil, S., Gittins, B., Landman, H.: VEST - Hardware-Dedicated Stream Ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/032 (2005), http://www.ecrypt.eu.org/stream
-
(2005)
-
-
O'Neil, S.1
Gittins, B.2
Landman, H.3
-
9
-
-
38149013416
-
-
O'Neil, S., Gittins, B., Landman, H.: VEST Ciphers. eSTREAM, ECRYPT Stream Cipher Project (2006), http://www.ecrypt.eu.org/stream/p2ciphers/vest/ vest_p2.pdf
-
O'Neil, S., Gittins, B., Landman, H.: VEST Ciphers. eSTREAM, ECRYPT Stream Cipher Project (2006), http://www.ecrypt.eu.org/stream/p2ciphers/vest/ vest_p2.pdf
-
-
-
-
10
-
-
85086422630
-
-
n/4) algorithm for certain NP-complete problems. SIAM Journal on Computing 10(3), 456-464 (1981)
-
n/4) algorithm for certain NP-complete problems. SIAM Journal on Computing 10(3), 456-464 (1981)
-
-
-
-
11
-
-
38149025747
-
Chosen IV Attack on Stream Cipher WG. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/045
-
Wu, H., Preneel, B.: Chosen IV Attack on Stream Cipher WG. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/045 (2005), http://www.ecrypt.eu.org/ stream
-
(2005)
-
-
Wu, H.1
Preneel, B.2
-
12
-
-
37149027724
-
Key Recovery Attack on Py and Pypy with Chosen IVs. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/052
-
Wu, H., Preneel, B.: Key Recovery Attack on Py and Pypy with Chosen IVs. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/052 (2006), http://www.ecrypt.eu.org/stream
-
(2006)
-
-
Wu, H.1
Preneel, B.2
|