NLFSR

Results: 14



#Item
1Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

Add to Reading List

Source URL: 2010.africacrypt.com

Language: English - Date: 2010-05-23 22:32:12
    2Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

    Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2011-01-18 19:16:52
    3A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

    A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-15 10:23:44
    4Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

    Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-02-22 22:32:18
    5State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1  Information Security Institute,

    State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-10 00:26:26
    6Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

    Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-31 09:15:34
    7Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul

    Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-11-16 23:58:57
    8On the cycle decomposition of the WG-NLFSR Li Yujuan 1†  & Shen Wenhua 2 & Wang Huaifu 3 & Zhou Peipei

    On the cycle decomposition of the WG-NLFSR Li Yujuan 1† & Shen Wenhua 2 & Wang Huaifu 3 & Zhou Peipei

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-08-23 22:48:53
    9ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

    ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2009-08-17 14:52:19
    10VEST Hardware-Dedicated Stream Ciphers (eSTREAM Round 1 Submission, Revised)

    VEST Hardware-Dedicated Stream Ciphers (eSTREAM Round 1 Submission, Revised)

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2005-10-31 03:26:50