Correlation attack

Results: 76



#Item
41Paper Title (use style: paper title)

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2011-09-28 10:25:46
42Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 Simon K¨ unzli4

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 Simon K¨ unzli4

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2007-05-21 09:21:54
43Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 , Claude Carlet2 , Philippe Gaborit3 , Simon K¨ unzli4 , Willi Meier4 , and Olivier Ruatta3 1

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Frederik Armknecht1 , Claude Carlet2 , Philippe Gaborit3 , Simon K¨ unzli4 , Willi Meier4 , and Olivier Ruatta3 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:48:47
44New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 11:46:34
45Algebraic Immunity of S-boxes and Augmented Functions Simon Fischer and Willi Meier FHNW, 5210 Windisch (Switzerland)  Abstract. In this paper, the algebraic immunity of S-boxes and augmented functions of

Algebraic Immunity of S-boxes and Augmented Functions Simon Fischer and Willi Meier FHNW, 5210 Windisch (Switzerland) Abstract. In this paper, the algebraic immunity of S-boxes and augmented functions of

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 12:41:00
46Grain - A Stream Cipher for Constrained Environments Martin Hell1 , Thomas Johansson1 and Willi Meier2 1  Dept. of Information Technology, Lund University,

Grain - A Stream Cipher for Constrained Environments Martin Hell1 , Thomas Johansson1 and Willi Meier2 1 Dept. of Information Technology, Lund University,

Add to Reading List

Source URL: edipermadi.files.wordpress.com

Language: English - Date: 2008-06-22 01:38:18
47Stream Ciphers  RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995  M.J.B. Robshaw

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
48Rabbit: A New High-Performance Stream Cipher Martin Boesgaard, Mette Vesterager,

Rabbit: A New High-Performance Stream Cipher Martin Boesgaard, Mette Vesterager,

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 15:51:12
49New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-03 20:00:46
50Table of Linear Feedback Shift Registers Roy Ward, Tim Molteno∗ October 26, 2007

Table of Linear Feedback Shift Registers Roy Ward, Tim Molteno∗ October 26, 2007

Add to Reading List

Source URL: www.eej.ulst.ac.uk

Language: English - Date: 2008-11-10 20:02:05