Shrinking generator

Results: 12



#Item
1Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:08
2Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
3DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
4DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:22:24
5slide 2 gaius slide 1 gaius

slide 2 gaius slide 1 gaius

Add to Reading List

Source URL: floppsie.comp.glam.ac.uk

Language: English - Date: 2015-02-04 11:32:30
6Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
7Linear Feedback Shift Registers in SAGE Timothy Brian Brock May 16, [removed]random numbers should not be generated by a method chosen at random. - Donald Knuth, The Art of Computer Programming.

Linear Feedback Shift Registers in SAGE Timothy Brian Brock May 16, [removed]random numbers should not be generated by a method chosen at random. - Donald Knuth, The Art of Computer Programming.

Add to Reading List

Source URL: www.rose-hulman.edu

Language: English - Date: 2006-10-02 20:51:03
8DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
9Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
10New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-03 20:00:46