-
1
-
-
35248871696
-
-
Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K
-
S. Blackburn, S. Murphy, F. Piper, and P. Wild. A SOBERing remark. Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K., 1998.
-
(1998)
A Sobering Remark
-
-
Blackburn, S.1
Murphy, S.2
Piper, F.3
Wild, P.4
-
3
-
-
84957630525
-
SOBER cryptanalysis. Fast Software Encryption
-
L. Knudsen ed., Springer- Verlag
-
D. Bleichenbacher and S Patel. SOBER cryptanalysis. Fast Software Encryption, FSE’99 Lecture Notes in Computer Science, vol. 1636, L. Knudsen ed., Springer- Verlag, pages 305-316, 1999.
-
(1999)
FSE’99 Lecture Notes in Computer Science
, vol.1636
, pp. 305-316
-
-
Bleichenbacher, D.1
Patel, S.2
-
4
-
-
85030473541
-
On a fast correlation attack on certain stream ciphers. Advances in Cryptology
-
D. W. Davies ed., Springer-Verlag
-
V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. Advances in Cryptology, EUROCRYPT’91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 176-185, 1991.
-
(1991)
EUROCRYPT’91, Lecture Notes in Computer Science
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
5
-
-
84961308145
-
Inversion attack and branching. Information Security and Privacy
-
ACISP’99, Lecture Notes in Computer Science,, J. Pieprzyk, R Safavi-Naini, J. Seberry eds., Springer-Verlag
-
J. Golić, A. Clark, and E. Dawson. Inversion attack and branching. Information Security and Privacy, Fourth Australasian Conference, ACISP’99, Lecture Notes in Computer Science, vol. 1587, J. Pieprzyk, R Safavi-Naini, J. Seberry eds., Springer-Verlag, pages 88-102, 1999.
-
(1999)
Fourth Australasian Conference
, vol.1587
, pp. 88-102
-
-
Golić, J.1
Clark, A.2
Dawson, E.3
-
6
-
-
84958983180
-
On the security of nonlinear filter generators
-
D. Gollmann ed., Springer
-
J. Dj. Golić. On the security of nonlinear filter generators. Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer, pages 173-188, 1995.
-
(1995)
Fast Software Encryption, Lecture Notes in Computer Science
, vol.1039
, pp. 173-188
-
-
Golić, J.D.1
-
7
-
-
84937502973
-
-
Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
-
P. Hawkes. An attack on SOBER-II. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999.
-
(1999)
An Attack on SOBER-II
-
-
Hawkes, P.1
-
8
-
-
27844457796
-
-
Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
-
P. Hawkes and G. Rose. The t-class of SOBER stream ciphers. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999. See http://www.home.aone.net.au/qualcomm.
-
(1999)
The T-Class of SOBER Stream Ciphers
-
-
Hawkes, P.1
Rose, G.2
-
9
-
-
85032286198
-
On functions of Linear Shift Register Sequences
-
Lecture Notes in Computer Science, F. Pichler ed., Springer-Verlag
-
T. Herlestam. On functions of Linear Shift Register Sequences. Advances in Cryptology, EUROCRYPT’85, Lecture Notes in Computer Science, vol. 219, F. Pichler ed., Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology, EUROCRYPT’85
, vol.219
-
-
Herlestam, T.1
-
10
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Lecture Notes in Computer Science, J. Sterned., Springer-Verlag
-
T. Johansson and F Jönsson. Improved fast correlation attacks on stream ciphers via convolutional codes. Advances in Cryptology, EUROCRYPT’99, Lecture Notes in Computer Science, vol. 1592, J. Sterned., Springer-Verlag, pages 347-362, 1999.
-
(1999)
Advances in Cryptology, EUROCRYPT’99
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
12
-
-
48249132171
-
-
Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
-
G. Rose. S32: A fast stream cipher based on linear feedback over GF(232). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998.
-
(1998)
S32: A Fast Stream Cipher Based on Linear Feedback over GF(232)
-
-
Rose, G.1
-
13
-
-
48249132171
-
-
Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia
-
G. Rose. SOBER: A stream cipher based on linear feedback over GF(28). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998. See http://www.home.aone.net.au/qualcomm.
-
(1998)
SOBER: A Stream Cipher Based on Linear Feedback over GF(28)
-
-
Rose, G.1
-
14
-
-
84956864062
-
A stream cipher based on linear feedback over GF(28)
-
Lecture Notes in Computer Science, C. Boyd, E. Dawson eds., Springer-Verlag
-
G. Rose. A stream cipher based on linear feedback over GF(28). Information Security and Privacy, Third Australasian Conference, ACISP’98, Lecture Notes in Computer Science, vol. 1438, C. Boyd, E. Dawson eds., Springer-Verlag, pages 135-146, 1998.
-
(1998)
Information Security and Privacy, Third Australasian Conference, ACISP’98
, vol.1438
, pp. 135-146
-
-
Rose, G.1
-
15
-
-
84937502975
-
-
Technical Report TR45.AHAG.99.02.09.15, TR45 Ad Hoc Authentication Group
-
M. Zhang, C. Carroll, and A. Chan. SSC. Technical Report TR45.AHAG.99.02.09.15, TR45 Ad Hoc Authentication Group, 1999.
-
(1999)
SSC
-
-
Zhang, M.1
Carroll, C.2
Chan, A.3
|