Stream ciphers

Results: 475



#Item
212612  IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBERC. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers (Lecture Notes in Computer Science, volHeidelberg, Germany:

2612 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBERC. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers (Lecture Notes in Computer Science, volHeidelberg, Germany:

Add to Reading List

Source URL: boris.ryabko.net

Language: English - Date: 2008-03-07 15:17:49
    22TSpecial Course on Cryptology November 25th, 2004 Algebraic Attacks and Stream Ciphers Mikko Kiviharju Helsinki University of Technology

    TSpecial Course on Cryptology November 25th, 2004 Algebraic Attacks and Stream Ciphers Mikko Kiviharju Helsinki University of Technology

    Add to Reading List

    Source URL: www.tcs.hut.fi

    Language: English - Date: 2005-01-18 09:05:25
      23Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

      Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-02-22 02:10:52
      24Leakage-resilient Stream Ciphers: an Overview Olivier Pereira∗ ICTEAM – Crypto Group Universit´e catholique de Louvain B-1348 Louvain-la-Neuve – Belgium March 10, 2011

      Leakage-resilient Stream Ciphers: an Overview Olivier Pereira∗ ICTEAM – Crypto Group Universit´e catholique de Louvain B-1348 Louvain-la-Neuve – Belgium March 10, 2011

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:34
        25Microsoft PowerPoint - isc2015jiaolin

        Microsoft PowerPoint - isc2015jiaolin

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-20 14:16:37
        26Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

        Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

        Add to Reading List

        Source URL: www.rocq.inria.fr

        Language: English - Date: 2006-03-23 04:05:33
        27Stream Ciphers and Block Ciphers Guest Lecture for 2WC12 Cryptography I - Fall 2011 Ruben Niederhagen  December 2nd, 2011

        Stream Ciphers and Block Ciphers Guest Lecture for 2WC12 Cryptography I - Fall 2011 Ruben Niederhagen December 2nd, 2011

        Add to Reading List

        Source URL: polycephaly.org

        Language: English - Date: 2013-05-10 00:59:35
          28Designing integrated accelerator for stream ciphers with structural similarities Sourav Sen Gupta, Anupam Chattopadhyay & Ayesha Khalid

          Designing integrated accelerator for stream ciphers with structural similarities Sourav Sen Gupta, Anupam Chattopadhyay & Ayesha Khalid

          Add to Reading List

          Source URL: www.souravsengupta.com

          Language: English - Date: 2014-03-16 03:17:12
            29Introduction Grain Family of Stream Ciphers Fault model The Attack  A Differential Fault Attack on Grain-128a using

            Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using

            Add to Reading List

            Source URL: cse.iitkgp.ac.in

            Language: English - Date: 2013-10-16 11:27:05
              30A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

              A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

              Add to Reading List

              Source URL: tls.mbed.org

              Language: English