Stream cipher

Results: 434



#Item
1Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
2Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: www.cryptme.in

Language: English - Date: 2018-07-09 04:03:14
    3Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

    Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

    Add to Reading List

    Source URL: courses.engr.illinois.edu

    Language: English - Date: 2016-02-02 12:14:19
    4Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

    Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

    Add to Reading List

    Source URL: www.rocq.inria.fr

    Language: English - Date: 2006-03-23 04:05:26
      5On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

      On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2006-02-15 04:14:19
        6ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-27 11:40:43
        7Proceedings  - NN - RFIDSec08

        Proceedings - NN - RFIDSec08

        Add to Reading List

        Source URL: events.iaik.tugraz.at

        Language: English - Date: 2008-07-17 01:40:17
        8Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

        Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-04-26 02:21:29
        9An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

        An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

        Add to Reading List

        Source URL: www.normalesup.org

        Language: English - Date: 2015-03-29 16:43:02
        10A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

        A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

        Add to Reading List

        Source URL: events.iaik.tugraz.at

        Language: English - Date: 2006-07-10 00:56:36