<--- Back to Details
First PageDocument Content
NLFSR / Correlation attack / ESTREAM / Espionage / Cyberwarfare / Applied mathematics / Stream ciphers / Achterbahn / Keystream
Date: 2007-02-06 10:13:21
NLFSR
Correlation attack
ESTREAM
Espionage
Cyberwarfare
Applied mathematics
Stream ciphers
Achterbahn
Keystream

Add to Reading List

Source URL: www.ecrypt.eu.org

Download Document from Source Website

File Size: 199,42 KB

Share Document on Facebook

Similar Documents

Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

DocID: 1ls0L - View Document

KeeLoq / Rolling code / MIFARE / Remote keyless system / NLFSR / Cipher / Block cipher / Contactless smart card / Radio electronics / Cryptography / Electronic engineering

Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

DocID: 1ftaT - View Document

Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

DocID: 188HH - View Document

Grain / Linear feedback shift register / ESTREAM / Advanced Encryption Standard / Block cipher / Cipher / NLFSR / Cube attack / Stream ciphers / Cryptography / Trivium

Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

DocID: 13w9s - View Document

Keystream / Linear feedback shift register / NLFSR / Correlation attack / QUAD / Stream ciphers / Cryptography / Grain

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

DocID: 136j8 - View Document