Stream ciphers

Results: 475



#Item
1A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 15:16:36
2A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 15:16:45
3Stream ciphers  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

Stream ciphers Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-10-19 10:06:44
    4Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: skew2011.mat.dtu.dk

    Language: English - Date: 2011-02-07 09:17:56
      5A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

      A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

      Add to Reading List

      Source URL: skew2011.mat.dtu.dk

      Language: English - Date: 2011-02-04 06:56:56
        6Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

        Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

        Add to Reading List

        Source URL: www.cryptme.in

        Language: English - Date: 2018-07-09 04:03:14
          7StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption Bernard Dickens III  Haryadi S. Gunawi

          StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption Bernard Dickens III Haryadi S. Gunawi

          Add to Reading List

          Source URL: people.cs.uchicago.edu

          Language: English - Date: 2018-01-21 21:03:11
            8Attacks on FCSR-based Stream Ciphers Thomas Johansson Lund University, Sweden Abstract In this talk we review some basics on FCSR sequences and give examples of proposed stream ciphers that have been constructed using FC

            Attacks on FCSR-based Stream Ciphers Thomas Johansson Lund University, Sweden Abstract In this talk we review some basics on FCSR sequences and give examples of proposed stream ciphers that have been constructed using FC

            Add to Reading List

            Source URL: seta2012.uwaterloo.ca

            - Date: 2012-02-01 10:48:32
              9ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

              ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

              Add to Reading List

              Source URL: www.ijmetmr.com

              Language: English - Date: 2015-02-27 11:40:43
              10Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

              Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

              Add to Reading List

              Source URL: www.iaik.tugraz.at

              Language: English - Date: 2015-09-08 06:00:03