Linear-feedback shift register

Results: 124



#Item
11Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks Yukiyasu Tsunoo1 , Teruo Saito2 , Maki Shigeri2 , Tomoyasu Suzaki2 , Hadi Ahmadi3 , Taraneh Eghlidos4 , and Shahram Khazaei5 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:30
12A SYMMETRIC KEY ENCRYPTION ALGORITHM  MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:45
13Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 10:29:32
14DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:22:24
15DVB-T2 Verification & Validation Working Group  The DVB-T2 Reference Streams th  Version: August, 2011)

DVB-T2 Verification & Validation Working Group The DVB-T2 Reference Streams th Version: August, 2011)

Add to Reading List

Source URL: www.dvb.org

Language: English - Date: 2013-10-08 10:21:06
16Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Stream Cipher KCipher-2 KDDI Corporation 1 Introduction This documentation gives a detailed description of a stream cipher (keystream generator) KCipher-2. KCipher2 uses two independent parameters as input, a 128-bit ini

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2010-01-29 01:17:36
17The Conditional Correlation Attack:  A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-01 16:50:50
18IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
19Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email:   Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email: Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-11 19:35:56
20Microsoft Word - uea2_uia2_d2_v1_1.doc

Microsoft Word - uea2_uia2_d2_v1_1.doc

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:52