ECRYPT

Results: 169



#Item
51

A Compact Implementation of Edon80? Markus Kasper, Sandeep Kumar, Kerstin Lemke-Rust, and Christof Paar Horst G¨ ortz Institute for IT Security Ruhr University BochumBochum, Germany

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-11-30 12:54:09
    52

    Statistical Analysis of Synchronous Stream Ciphers Meltem S¨ onmez Turan, Ali Do˘ganaksoy, C ¸ a˘gda¸s C ¸ alık

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2006-02-13 07:41:31
      53

      Adding MAC functionality to Edon80 Danilo Gligoroski and Svein Johan Knapskog Centre for Quantifiable Quality of Service in Communication Systems, Norwegian University of Science and Technology, O.S.Bragstads plass 2E, N

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-02-22 22:32:58
        54

        A Lightweight Implementation of the Pomaranch S-Box Cees J.A. Jansen1 , Alexander Kholosha2 and Tor Helleseth2 1 DeltaCrypto B.V.

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2007-07-15 00:30:28
          55

          The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2008-02-29 13:11:28
            56

            Response to “On the Salsa20 core function” Daniel J. Bernstein ? Department of Mathematics, Statistics, and Computer Science (M/C 249)

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2008-02-25 03:41:49
              57ESTREAM / Linear feedback shift register / SNOW / Keystream / Stream ciphers / Cryptography / SOSEMANUK

              Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2006-02-13 07:41:30
              58RC4 / Initialization vector / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Py

              How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2007-01-22 11:51:20
              59Keystream / Advanced Encryption Standard / ESTREAM / Trivium / RC4 / Stream ciphers / Cryptography / Hermes8

              Cryptanalysis of Hermes8F Steve Babbage1 , Carlos Cid2 , Norbert Pramstaller3 and Håvard Raddum4 4 1

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2006-08-13 05:59:44
              60Measurement / Inductive reasoning / Random variable / Log-normal distribution / Normal distribution / Probability and statistics / Randomness / Probability theory

              Understanding Periods in Edon80 - Response on Remarks on the Period of Edon80, by Jin Hong D. Gligoroski∗ ∗∗ , S. Markovski∗∗ , L. Kocarev∗∗∗ and M. Guˇ sev∗∗ ∗

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2005-07-29 11:43:26
              UPDATE