-
1
-
-
38149054788
-
-
Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, p. 19. Springer, Heidelberg (2004)
-
Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, p. 19. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
68849110202
-
Sosemanuk, a Fast Software-Oriented Stream Cipher. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/001
-
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Sosemanuk, a Fast Software-Oriented Stream Cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001 (2005), http://www.ecrypt.eu.org/stream
-
(2005)
-
-
Berbain, C.1
Billet, O.2
Canteaut, A.3
Courtois, N.4
Gilbert, H.5
Goubin, L.6
Gouget, A.7
Granboulan, L.8
Lauradoux, C.9
Minier, M.10
Pornin, T.11
Sibert, H.12
-
3
-
-
33746077698
-
QUAD: A Practical Stream Cipher with Provable Security
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Berbain, C., Gilbert, H., Patarin, J.: QUAD: a Practical Stream Cipher with Provable Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
5
-
-
84867937546
-
A new 128 bit key Stream Cipher : LEX. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/001
-
Biryukov, A.: A new 128 bit key Stream Cipher : LEX. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001 (2005), http://www.ecrypt.eu.org/stream
-
(2005)
-
-
Biryukov, A.1
-
6
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
Blum, M., Micali, S.: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput. 13(4), 850-864 (1984)
-
(1984)
SIAM J. Comput
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
84974670663
-
The Shrinking Generator
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22-39. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
8
-
-
85028746172
-
Resynchronization Weaknesses in Synchronous Stream Ciphers
-
Helleseth, T, ed, Advances in Cryptology, EU-ROCRYPT '93, Springer, Heidelberg
-
Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) Advances in Cryptology - EU-ROCRYPT '93. LNCS, vol. 765, pp. 159-167. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.765
, pp. 159-167
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
10
-
-
84949223752
-
-
Selected Areas in Cryptography, pp
-
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Selected Areas in Cryptography, pp. 1-24 (2001)
-
(2001)
Weaknesses in the Key Scheduling Algorithm of RC4
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
11
-
-
0242571716
-
-
Gilbert, H.: The Security of One-Block-to-Many Modes of Operation. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 376-395. Springer, Heidelberg (2003)
-
Gilbert, H.: The Security of "One-Block-to-Many" Modes of Operation. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 376-395. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
0022793132
-
How to Construct Random Functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
38149052814
-
Sparse Pseudorandom Distributions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Goldreich, O., Krawczyk, H.: Sparse Pseudorandom Distributions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 113-127. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 113-127
-
-
Goldreich, O.1
Krawczyk, H.2
-
15
-
-
84949426591
-
-
Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 195-209. Springer, Heidelberg (2002)
-
Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195-209. Springer, Heidelberg (2002)
-
-
-
-
16
-
-
35048826667
-
-
Joux, A., Muller, F.: A Chosen IV Attack Against Turing. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 194-207. Springer, Heidelberg (2004)
-
Joux, A., Muller, F.: A Chosen IV Attack Against Turing. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 194-207. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
26444613466
-
-
Muller, F.: Differential Attacks against the Helix Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, Springer, Heidelberg (2004)
-
Muller, F.: Differential Attacks against the Helix Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, Springer, Heidelberg (2004)
-
-
-
-
18
-
-
84976667857
-
On the Generation of Cryptographically Strong Pseudo-Random Sequences
-
Even, S, Kariv, O, eds, Automata, Languages and Programming, Springer, Heidelberg
-
Shamir, A.: On the Generation of Cryptographically Strong Pseudo-Random Sequences. In: Even, S., Kariv, O. (eds.) Automata, Languages and Programming, LNCS, vol. 115, pp. 544-550. Springer, Heidelberg (1981)
-
(1981)
LNCS
, vol.115
, pp. 544-550
-
-
Shamir, A.1
-
19
-
-
33746075070
-
Theory and Applications of Trapdoor Function
-
Yao, A.: Theory and Applications of Trapdoor Function. In: Foundations of Cryptography FOCS 1982 (1982)
-
(1982)
Foundations of Cryptography FOCS
-
-
Yao, A.1
|