ESTREAM

Results: 54



#Item
1Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆ ome Berbain , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 2

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆ ome Berbain , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 2

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2014-09-02 14:57:05
2EACirc_eStream_SeCrypt2013_v16.dvi

EACirc_eStream_SeCrypt2013_v16.dvi

Add to Reading List

Source URL: crocs.fi.muni.cz

Language: English - Date: 2018-04-25 10:30:18
    3Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits ˇ Petr Svenda, Martin Ukrop, and Vashek Maty´aˇs

    Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits ˇ Petr Svenda, Martin Ukrop, and Vashek Maty´aˇs

    Add to Reading List

    Source URL: crocs.fi.muni.cz

    Language: English - Date: 2014-09-16 13:25:20
      4Microsoft PowerPoint - preneel_ eSTREAM-FSE.ppt

      Microsoft PowerPoint - preneel_ eSTREAM-FSE.ppt

      Add to Reading List

      Source URL: fse2007.uni.lu

      Language: English - Date: 2007-05-23 09:25:57
        5DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

        DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

        Add to Reading List

        Source URL: www.rocq.inria.fr

        Language: English - Date: 2006-03-23 04:05:33
        6Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆ ome Berbain , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 2

        Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆ ome Berbain , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 2

        Add to Reading List

        Source URL: www.lix.polytechnique.fr

        Language: English - Date: 2014-09-02 16:39:35
          7The self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 Joan Daemen, STMicroelectronics Belgium,  Paris Kitsos, Hellenic Open University, Patras, Greece,  8 Decembe

          The self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 Joan Daemen, STMicroelectronics Belgium, Paris Kitsos, Hellenic Open University, Patras, Greece, 8 Decembe

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          - Date: 2007-04-06 08:40:39
            8Susceptibility of eSTREAM Candidates towards Side Channel Analysis⋆ Benedikt Gierlichs1 , Lejla Batina1 , Christophe Clavier2 , Thomas Eisenbarth3 , Aline Gouget4 , Helena Handschuh5 , Timo Kasper3 , Kerstin Lemke-Rust

            Susceptibility of eSTREAM Candidates towards Side Channel Analysis⋆ Benedikt Gierlichs1 , Lejla Batina1 , Christophe Clavier2 , Thomas Eisenbarth3 , Aline Gouget4 , Helena Handschuh5 , Timo Kasper3 , Kerstin Lemke-Rust

            Add to Reading List

            Source URL: www.cosic.esat.kuleuven.be

            Language: English
              9Testing Framework for eSTREAM Profile II Candidates? L. Batina1 , S. Kumar2 , J. Lano1 , K. Lemke2 , N. Mentens1 , C. Paar2 , B. Preneel1 , K. Sakiyama1 and I. Verbauwhede1 1

              Testing Framework for eSTREAM Profile II Candidates? L. Batina1 , S. Kumar2 , J. Lano1 , K. Lemke2 , N. Mentens1 , C. Paar2 , B. Preneel1 , K. Sakiyama1 and I. Verbauwhede1 1

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2006-02-13 07:41:31
                10The ZK-Crypt III Algorithm Specification  THE ZK-CRYPT STREAM CIPHER & DATA AUTHENTICATION ALGORITHM WITH IMPLEMENTATIONS AN ARCHIVED PROFILE II CANDIDATE FOR THE eSTREAM CONTEST INCLUDES THE DUAL TRACK FEEDBACK STRATEGY

                The ZK-Crypt III Algorithm Specification THE ZK-CRYPT STREAM CIPHER & DATA AUTHENTICATION ALGORITHM WITH IMPLEMENTATIONS AN ARCHIVED PROFILE II CANDIDATE FOR THE eSTREAM CONTEST INCLUDES THE DUAL TRACK FEEDBACK STRATEGY

                Add to Reading List

                Source URL: www.ecrypt.eu.org

                Language: English - Date: 2008-02-15 09:35:25