-
2
-
-
0005239414
-
A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection
-
S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.
-
(1995)
IEE Conference Publication No
, pp. 408
-
-
Babbage, S.1
-
5
-
-
0034295410
-
Embedding attacks on step[1..D] clockcontrolled generators
-
W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clockcontrolled generators. Electronics Letters, vol.36 pp.1771-1773, 2000.
-
(2000)
Electronics Letters
, vol.36
, pp. 1771-1773
-
-
Chambers, W.G.1
Gollmann, D.2
-
6
-
-
77952366023
-
-
E. Dawson, A. Clark, J. Golic, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions.html.
-
The LILI-128 Keystream Generator
-
-
Dawson, E.1
Clark, A.2
Golic, J.3
Millan, W.4
Penna, L.5
Simpson, L.6
-
8
-
-
0025824847
-
A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance
-
J. Dj. Golic and M. J. Mihaljevic. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journalof Cryptology, vol. 3(3), pp. 201–212, 1991.
-
(1991)
Journalof Cryptology
, vol.3
, Issue.3
, pp. 201-212
-
-
Golic, J.D.1
Mihaljevic, M.J.2
-
14
-
-
0036471040
-
Parallel Stream Cipher for Secure High-Speed Communications
-
H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. SignalP rocessing, vol. 82, no. 2, pp. 137-143, 2002.
-
(2002)
Signalp Rocessing
, vol.82
, Issue.2
, pp. 137-143
-
-
Lee, H.-J.1
Moon, S.-J.2
-
16
-
-
0024860262
-
Fast Correlation Attacks on Certain Stream Ciphers
-
W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journalof Cryptology, vol. 1(3), pp. 159–167, 1989.
-
(1989)
Journalof Cryptology
, vol.1
, Issue.3
, pp. 159-167
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
84947420109
-
Fast Correlation Attacks and Multiple Linear Approximations
-
M. Salmasizadeh, L. Simpson, J. Dj. Golic and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy - Nepean’97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer–Verlag, 1997.
-
(1997)
Information Security and Privacy - Nepean’97, Volume 1270 of Lecture Notes in Computer Science
, pp. 228-239
-
-
Salmasizadeh, M.1
Simpson, L.2
Golic, J.D.3
Dawson, E.4
-
20
-
-
84947462207
-
-
IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985.
-
(1985)
IEEE Trans. Computers, Vol
, vol.34
, Issue.1
, pp. 81-85
-
-
-
22
-
-
84949212529
-
LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology - SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261
-
L. Simpson, E. Dawson, J. Dj. Golic and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology - SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer–Verlag, 2000.
-
(2000)
Springer–Verlag
-
-
Simpson, L.1
Dawson, E.2
Golic, J.D.3
Millan, W.4
-
24
-
-
0026219481
-
An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register
-
M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept 1991.
-
(1991)
IEEE Trans. Inform. Theory, Vol. IT-37
, pp. 1488-1490
-
-
Ivkovic, M.Z.1
|