Linear-feedback shift register

Results: 124



#Item
51Improved Linear Distinguishers for SNOW 2.0 Kaisa Nyberg1,2 and Johan Wall´en1 1 Helsinki University of Technology and 2 Nokia Research Center, Finland Email: [removed]; [removed]

Improved Linear Distinguishers for SNOW 2.0 Kaisa Nyberg1,2 and Johan Wall´en1 1 Helsinki University of Technology and 2 Nokia Research Center, Finland Email: [removed]; [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
52Cryptanalysis of the Knapsack Generator

Cryptanalysis of the Knapsack Generator

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-02-14 15:21:20
53Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
54Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
55Bit Error Rate Testing Serial Communication Equipment using Pseudo-Random Bit Sequences Marius Strobl, Thomas Waas Marcel Moolenaar

Bit Error Rate Testing Serial Communication Equipment using Pseudo-Random Bit Sequences Marius Strobl, Thomas Waas Marcel Moolenaar

Add to Reading List

Source URL: conference.ieee-passau.org

Language: English - Date: 2012-11-05 15:02:40
56Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz Horst-Goertz Institute for IT Security Ruhr-University Bochum, Ger

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz Horst-Goertz Institute for IT Security Ruhr-University Bochum, Ger

Add to Reading List

Source URL: gmr.crypto.rub.de

Language: English - Date: 2012-02-07 10:58:42
57Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-26 18:35:08
581  A physical layer DSB Enc scheme for RFID systems Muhammad Khizer Kaleem, and Guang Gong, Fellow, IEEE

1 A physical layer DSB Enc scheme for RFID systems Muhammad Khizer Kaleem, and Guang Gong, Fellow, IEEE

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-25 12:25:03
59TUGboat, Volume[removed]), No. 1 to show off. And reader contributions for this column are still welcome! o Victor Eijkhout Department of Computer Science University of Tennessee at

TUGboat, Volume[removed]), No. 1 to show off. And reader contributions for this column are still welcome! o Victor Eijkhout Department of Computer Science University of Tennessee at

Add to Reading List

Source URL: tug.org

Language: English - Date: 2011-10-16 21:01:40
601  New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong

1 New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:50:57