<--- Back to Details
First PageDocument Content
Binary arithmetic / Linear feedback shift register / Berlekamp–Massey algorithm / RC4 / Q / ORYX / Cipher / NLFSR / Grain / Cryptography / Stream ciphers / Pseudorandom number generators
Date: 2008-04-17 11:52:39
Binary arithmetic
Linear feedback shift register
Berlekamp–Massey algorithm
RC4
Q
ORYX
Cipher
NLFSR
Grain
Cryptography
Stream ciphers
Pseudorandom number generators

Stream Ciphers Stream Ciphers

Add to Reading List

Source URL: www.cs.sjsu.edu

Download Document from Source Website

File Size: 581,45 KB

Share Document on Facebook

Similar Documents

Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

DocID: 1ls0L - View Document

KeeLoq / Rolling code / MIFARE / Remote keyless system / NLFSR / Cipher / Block cipher / Contactless smart card / Radio electronics / Cryptography / Electronic engineering

Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

DocID: 1ftaT - View Document

Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

DocID: 188HH - View Document

Grain / Linear feedback shift register / ESTREAM / Advanced Encryption Standard / Block cipher / Cipher / NLFSR / Cube attack / Stream ciphers / Cryptography / Trivium

Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

DocID: 13w9s - View Document

Keystream / Linear feedback shift register / NLFSR / Correlation attack / QUAD / Stream ciphers / Cryptography / Grain

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

DocID: 136j8 - View Document