-
2
-
-
33646787968
-
Primitive specification and supporting documentation for SOBER-tw submission to NESSIE
-
Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-tw submission to NESSIE. In: Proceedings of the First NESSIE Workshop, NESSIE (2000)
-
(2000)
Proceedings of the First NESSIE Workshop, NESSIE
-
-
Hawkes, P.1
Rose, G.G.2
-
4
-
-
84947914704
-
-
Daemen, J., Clapp, C.S.K.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, 1372, pp. 60-74. Springer, Heidelberg (1998)
-
Daemen, J., Clapp, C.S.K.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60-74. Springer, Heidelberg (1998)
-
-
-
-
6
-
-
0033191650
-
Maximum distance separable convolutional codes
-
Rosenthal, J., Smarandache, R.: Maximum distance separable convolutional codes. Applicable Algebra in Engineering, Communication and Computing 10(1), 15-32 (1999)
-
(1999)
Applicable Algebra in Engineering, Communication and Computing
, vol.10
, Issue.1
, pp. 15-32
-
-
Rosenthal, J.1
Smarandache, R.2
-
7
-
-
48249099014
-
-
Bernstein, D.J.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
-
Bernstein, D.J.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
-
-
-
-
8
-
-
48249085469
-
-
Khazaei, S.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
-
Khazaei, S.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
-
-
-
-
9
-
-
48249121692
-
Two trivial attacks on Trivium. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/003
-
Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/003 (2007), http://www.ecrypt.eu.org/ stream
-
(2007)
-
-
Maximov, A.1
Biryukov, A.2
-
10
-
-
57049177122
-
Cryptanalytic results on TRIVIUM. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/039
-
Raddum, H.: Cryptanalytic results on TRIVIUM. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039 (2006), http://www.ecrypt.eu.org/stream
-
(2006)
-
-
Raddum, H.1
-
11
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.T.1
Meier, W.2
-
12
-
-
38149055134
-
Attacking Bivium with MiniSat. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/040
-
McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/040 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
McDonald, C.1
Charnes, C.2
Pieprzyk, J.3
-
13
-
-
38149138248
-
-
Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 366-381. Springer, Heidelberg (2007)
-
Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 366-381. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
48249097255
-
Linear approximations for 2-round Trivium. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/008
-
Turan, M.S., Kara, O.: Linear approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Turan, M.S.1
Kara, O.2
-
15
-
-
48249152755
-
Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive
-
Report 2007/413
-
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive, Report 2007/413 (2007), http://eprint.iacr. org/
-
(2007)
-
-
Vielhaber, M.1
-
16
-
-
48249129410
-
-
Fischer, S., Khazaei, S., Meier, W.: Key recovery with probabilistic neutral bits. Presented at the Echternach Symmetric Cryptography Seminar (2008)
-
Fischer, S., Khazaei, S., Meier, W.: Key recovery with probabilistic neutral bits. Presented at the Echternach Symmetric Cryptography Seminar (2008)
-
-
-
-
17
-
-
62949102882
-
Hardware results for selected stream cipher candidates. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/023
-
Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/023 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Good, T.1
Benaissa, M.2
-
18
-
-
48249103232
-
Power analysis of synchronous stream ciphers with resynchronization mechanism
-
Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power analysis of synchronous stream ciphers with resynchronization mechanism. In: ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, pp. 327-333 (2004)
-
(2004)
ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers
, pp. 327-333
-
-
Lano, J.1
Mentens, N.2
Preneel, B.3
Verbauwhede, I.4
-
19
-
-
48249087441
-
Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, TRIVIUM, VEST, ZK-Crypt. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/015
-
Gürkaynak, F.K., Luethi, P., Bernold, N., Blattmann, R., Goode, V., Marghitola, M., Kaeslin, H., Felber, N., Fichtner, W.: Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, TRIVIUM, VEST, ZK-Crypt. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/015 (2006), http://www.ecrypt.eu.org/stream
-
(2006)
-
-
Gürkaynak, F.K.1
Luethi, P.2
Bernold, N.3
Blattmann, R.4
Goode, V.5
Marghitola, M.6
Kaeslin, H.7
Felber, N.8
Fichtner, W.9
-
20
-
-
84860313632
-
Comparison of hardware performance of selected Phase II eSTREAM candidates. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/027
-
Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/027 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Gaj, K.1
Southern, G.2
Bachimanchi, R.3
-
21
-
-
79952588176
-
FPGA implementations of eSTREAM Phase-2 focus candidates with hardware profile. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/024
-
Bulens, P., Kalach, K., Standaert, F.X., Quisquater, J.J.: FPGA implementations of eSTREAM Phase-2 focus candidates with hardware profile. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/024 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Bulens, P.1
Kalach, K.2
Standaert, F.X.3
Quisquater, J.J.4
-
22
-
-
36248998144
-
Review of stream cipher candidates from a low resource hardware perspective. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/016
-
Good, T., Chelton, W., Benaissa, M.: Review of stream cipher candidates from a low resource hardware perspective. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/016 (2006), http://www.ecrypt.eu.org/stream
-
(2006)
-
-
Good, T.1
Chelton, W.2
Benaissa, M.3
-
23
-
-
78049312524
-
Hardware evaluation of eSTREAM candidates: Grain, Lex, Mickey128, Salsa20 and Trivium. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/025
-
Rogawski, M.: Hardware evaluation of eSTREAM candidates: Grain, Lex, Mickey128, Salsa20 and Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/025 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Rogawski, M.1
-
24
-
-
80052688181
-
Comparison of low-power implementations of Trivium and Grain. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/027
-
Feldhofer, M.: Comparison of low-power implementations of Trivium and Grain. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/027 (2007), http://www.ecrypt.eu.org/stream
-
(2007)
-
-
Feldhofer, M.1
|