-
1
-
-
79959970890
-
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain- 128
-
Aumasson, J.P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain- 128. In: SHARCS (2009)
-
(2009)
SHARCS
-
-
Aumasson, J.P.1
Dinur, I.2
Henzen, L.3
Meier, W.4
Shamir, A.5
-
2
-
-
70350385117
-
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
-
Dunkelman, O. (ed.) Fast Software Encryption. Springer, Heidelberg
-
Aumasson, J.P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol. 5665, pp. 1-22. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 1-22
-
-
Aumasson, J.P.1
Dinur, I.2
Meier, W.3
Shamir, A.4
-
3
-
-
56649114656
-
Differential Cryptanalysis in Stream Ciphers
-
ePrint Archive, Report 2007/218
-
Biham, E., Dunkelman, O.: Differential Cryptanalysis in Stream Ciphers. Cryptology ePrint Archive, Report 2007/218 (2007), http://eprint.iacr.org/
-
(2007)
Cryptology
-
-
Biham, E.1
Dunkelman, O.2
-
4
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
33750241980
-
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
Cannière, C.D.: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171-186. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 171-186
-
-
Cannière, C.D.1
-
6
-
-
70350589237
-
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Cannìere, C.D., Dunkelman, O., Knezevic, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 272-288
-
-
Cannìere, C.D.1
Dunkelman, O.2
Knezevic, M.3
-
7
-
-
45449087908
-
Analysis of Grain's Initialization Algorithm
-
Vaudenay, S. (ed.) AFRICACRYPT 2008. Springer, Heidelberg
-
Cannìere, C.D., Küçük, Ö., Preneel, B.: Analysis of Grain's Initialization Algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276-289. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 276-289
-
-
Cannìere, C.D.1
Küçük, Ö.2
Preneel, B.3
-
8
-
-
67650699727
-
Cube Attacks on Tweakable Black Box Polynomials
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5479
, pp. 278-299
-
-
Dinur, I.1
Shamir, A.2
-
9
-
-
78650823590
-
-
The eSTREAM project
-
ECRYPT: The eSTREAM project, http://www.ecrypt.eu.org/stream/
-
-
-
-
10
-
-
38349025631
-
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Englund, H., Johansson, T., Turan, M.S.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268-281. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 268-281
-
-
Englund, H.1
Johansson, T.2
Turan, M.S.3
-
11
-
-
45449101664
-
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
-
Vaudenay, S. (ed.) AFRICACRYPT 2008. Springer, Heidelberg
-
Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236-245. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 236-245
-
-
Fischer, S.1
Khazaei, S.2
Meier, W.3
-
12
-
-
39049129315
-
A Stream Cipher Proposal: Grain-128
-
Hell, M., Johansson, T., Maximov, A., Meier, W.: A Stream Cipher Proposal: Grain-128. In: ISIT, pp. 1614-1618 (2006)
-
(2006)
ISIT
, pp. 1614-1618
-
-
Hell, M.1
Johansson, T.2
Maximov, A.3
Meier, W.4
-
13
-
-
84886703527
-
Grain: A Stream Cipher for Constrained Environments
-
Hell, M., Johansson, T., Meier, W.: Grain: A Stream Cipher for Constrained Environments. IJWMC 2(1), 86-93 (2007)
-
(2007)
IJWMC
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
14
-
-
58549086616
-
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
-
Khazaei, S., Meier, W.: New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 15-26. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 15-26
-
-
Khazaei, S.1
Meier, W.2
-
15
-
-
84948949623
-
Truncated and Higher Order Differentials
-
Preneel, B. (ed.) FSE 1994. Springer, Heidelberg
-
Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
16
-
-
0041863249
-
Higher order derivatives and differential cryptanalysis
-
Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Kluwer Academic Publishers, Dordrecht
-
Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Communicationis and Cryptography: Two Sides of one Tapestry, pp. 227-233. Kluwer Academic Publishers, Dordrecht (1994)
-
(1994)
Communicationis and Cryptography: Two Sides of One Tapestry
, pp. 227-233
-
-
Lai, X.1
-
17
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
18
-
-
33746684991
-
Resynchronization Attacks on WG and LEX
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Wu, H., Preneel, B.: Resynchronization Attacks on WG and LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 422-432. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 422-432
-
-
Wu, H.1
Preneel, B.2
|