-
1
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Advances in Cryptology-Asiacrypt'00, Springer-Verlag
-
A. Biryukov and A. Shamir, Cryptanalytic time/memory/data tradeoffs for stream ciphers, Advances in Cryptology-Asiacrypt'00, Lecture Notes in Computer Science, vol. 1976. Springer-Verlag, 2000, pp. 1-13.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
2
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Fast Software Encryption' 00, Springer-Verlag
-
V. Chepyzhov, T. Johansson and B. Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption' 00, Lecture Notes in Computer Science, vol. 1978, Springer-Verlag, 2001, pp. 181-195.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
3
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
Advances in Cryptology-Crypto'03, Springer-Verlag
-
N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-Crypto'03, Lecture Notes in Computer Science, vol. 2729, pp. 176-194, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
4
-
-
35248820612
-
Algebraic attacks on stream ciphers with lienar feedback
-
Advances in Cryptology-Eurocrypt'03, Springer
-
N. Courtois and W. Meier, Algebraic attacks on stream ciphers with lienar feedback, Advances in Cryptology-Eurocrypt'03, Lecture Notes in Computer Science, vol. 2656, pp. 345-359, Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
5
-
-
67650699727
-
Cube attacks on tweakable black box polynomials
-
Advances in Cryptology-Eurocrypt'09. Springer
-
I. Dinur, A. Shamir, Cube attacks on tweakable black box polynomials. Advances in Cryptology-Eurocrypt'09. Lecture Notes in Computer Science, vol. 5479, pp. 278C299. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
-
-
Dinur, I.1
Shamir, A.2
-
6
-
-
85164899617
-
Hummingbird: Ultra-lightweight cryptography for resource-constrained devices
-
To appear in the
-
D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, Hummingbird: ultra-lightweight cryptography for resource-constrained devices, To appear in the Proceedings of the 14th International Conference on Financial Cryptography and Data Security-FC 2010, January 25-28, 2010, Tenerife, Canary Islands, Spain.
-
Proceedings of the 14th International Conference on Financial Cryptography and Data Security-FC 2010, January 25-28, 2010, Tenerife, Canary Islands, Spain
-
-
Engels, D.1
Fan, X.2
Gong, G.3
Hu, H.4
Smith, E.M.5
-
7
-
-
37149018890
-
A Survey of Lightweight-Cryptography Implementations
-
T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol. 24, no. 6, pp. 522-533, 2007.
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
8
-
-
77950332642
-
Lightweight implementation of Hummingbird cryptographic algorithm on 4-Bit Microcontrollers
-
X. Fan, H. Hu, G. Gong, E. M. Smith and D. Engels, Lightweight implementation of Hummingbird cryptographic algorithm on 4-Bit Microcontrollers, Proceedings of the 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09), pp. 838-844, 2009.
-
(2009)
Proceedings of the 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09)
, pp. 838-844
-
-
Fan, X.1
Hu, H.2
Gong, G.3
Smith, E.M.4
Engels, D.5
-
9
-
-
85164900472
-
Fast Linear Subspace Attacks on Stream Ciphers
-
Avaiable at
-
G. Gong, S. Ronjom, T. Helleseth and H. Hu. Fast Linear Subspace Attacks on Stream Ciphers, CACR Technical Report. Avaiable at http://www.cacr.math. uwaterloo.ca/techreports/2009/cacr2009-04.pdf.
-
CACR Technical Report
-
-
Gong, G.1
Ronjom, S.2
Helleseth, T.3
Hu, H.4
-
10
-
-
0036845302
-
Cryptographic properties of the Welch-Gong transformation sequence generators
-
G. Gong and A. Youssef, Cryptographic properties of the Welch-Gong transformation sequence generators, IEEE Transactions on Information Theory, vol. 48, no. 11, pp. 2837-2846, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.11
, pp. 2837-2846
-
-
Gong, G.1
Youssef, A.2
-
11
-
-
27244443921
-
AES on FPGA from the Fastest to the Smallest
-
T. Good and M. Benaissa , AES on FPGA from the Fastest to the Smallest, Lecture Notes in Computer Science, vol. 3659, pp. 427-440, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 427-440
-
-
Good, T.1
Benaissa, M.2
-
12
-
-
35048899747
-
Related key differential attacks on 27 rounds of XTEA and full-round GOST
-
Fast Software Encryption'04, Springer-Verlag
-
Y. Ko, S. Hong, W. Lee, S. Lee and J.S. Kang, Related key differential attacks on 27 rounds of XTEA and full-round GOST, Fast Software Encryption'04, Lecture Notes in Computer Science, vol 3017, Springer-Verlag, 2004, pp. 299-316.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 299-316
-
-
Ko, Y.1
Hong, S.2
Lee, W.3
Lee, S.4
Kang, J.S.5
-
14
-
-
35048845264
-
Algebraic attacks and decomposition of boolean functions
-
Advances in Cryptology-Eurocrypt'04, Springer
-
W. Meier, E. Pasalic and C. Carlet, Algebraic attacks and decomposition of boolean functions, In Advances in Cryptology-Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, pp. 474-491, Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 474-491
-
-
Meier, W.1
Pasalic, E.2
Carlet, C.3
-
15
-
-
38549124306
-
Two trivial attacks on trivium
-
Selected Areas in Cryptography, Springer-Verlag
-
A. Maximov and A. Biryukov, Two trivial attacks on trivium, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol 4876, Springer-Verlag, 2007, pp. 36-55.
-
(2007)
Lecture Notes in Computer Science
, vol.4876
, pp. 36-55
-
-
Maximov, A.1
Biryukov, A.2
-
16
-
-
37149008034
-
Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers
-
G. Meiser, T. Eisenbarth, K. Lemke-Rust and C. Paar, Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers, Workshop Record State of the Art of Stream Ciphers (SASC 07), 2007.
-
Workshop Record State of the Art of Stream Ciphers (SASC 07), 2007
-
-
Meiser, G.1
Eisenbarth, T.2
Lemke-Rust, K.3
Paar, C.4
-
18
-
-
38649135720
-
WG: A family of stream ciphers with designed randomness properties
-
Y. Nawaz and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Science, vol. 178, no. 7, pp. 1903-1916, 2008.
-
(2008)
Information Science
, vol.178
, Issue.7
, pp. 1903-1916
-
-
Nawaz, Y.1
Gong, G.2
-
19
-
-
78049345090
-
-
D. Otte, AVR-Crypto-Lib, http://www.das-labor.org/wiki/AVR-Crypto-Lib/en, 2009.
-
(2009)
AVR-Crypto-Lib
-
-
Otte, D.1
-
20
-
-
34248340114
-
A new attack on the filter generator
-
S. Ronjom and T. Helleseth, A new attack on the filter generator, IEEE Transactions on Information Theory, vol. 53, no. 5, pp. 1752-1758, 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.5
, pp. 1752-1758
-
-
Ronjom, S.1
Helleseth, T.2
-
21
-
-
38149000895
-
m)
-
Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, June 2007
-
m), Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, June 2007, Lecture Notes on Computer Science, vol. 4547, pp. 264-275, 2007.
-
(2007)
Lecture Notes on Computer Science
, vol.4547
, pp. 264-275
-
-
Ronjom, S.1
Helleseth, T.2
-
22
-
-
38549115772
-
On attacks on filtering generators using linear subspace structures
-
Sequences, Subsequences and Consequences, S.W. Golomb et al. (Eds.)
-
S. Ronjom, G. Gong and T. Helleseth, On attacks on filtering generators using linear subspace structures, Sequences, Subsequences and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893, pp. 204-217, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4893
, pp. 204-217
-
-
Ronjom, S.1
Gong, G.2
Helleseth, T.3
-
23
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information Theory, vol. 30, no. 5, pp. 776-780, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, Issue.5
, pp. 776-780
-
-
Siegenthaler, T.1
-
24
-
-
85164886079
-
Hardware/software codesign for stream ciphers
-
submitted to
-
P. Schaumont and I. Verbauwhede., Hardware/software codesign for stream ciphers, submitted to ESTREAM Project, 2007.
-
(2007)
ESTREAM Project
-
-
Schaumont, P.1
Verbauwhede, I.2
-
25
-
-
70349297362
-
Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept
-
M. Vogt, A. Poschmann, and C. Paar, Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept, 2009 IEEE International Conference on RFID, pp. 241-248, 2009.
-
(2009)
2009 IEEE International Conference on RFID
, pp. 241-248
-
-
Vogt, M.1
Poschmann, A.2
Paar, C.3
|