<--- Back to Details
First PageDocument Content
Cube attack / NLFSR / RC4 / Symmetric-key algorithm / Block cipher / ESTREAM / Linear feedback shift register / Cipher / MICKEY / Stream ciphers / Cryptography / Trivium
Date: 2009-09-03 23:26:02
Cube attack
NLFSR
RC4
Symmetric-key algorithm
Block cipher
ESTREAM
Linear feedback shift register
Cipher
MICKEY
Stream ciphers
Cryptography
Trivium

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 351,86 KB

Share Document on Facebook

Similar Documents

Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion

DocID: 1ls0L - View Document

KeeLoq / Rolling code / MIFARE / Remote keyless system / NLFSR / Cipher / Block cipher / Contactless smart card / Radio electronics / Cryptography / Electronic engineering

Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx

DocID: 1ftaT - View Document

Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

DocID: 188HH - View Document

Grain / Linear feedback shift register / ESTREAM / Advanced Encryption Standard / Block cipher / Cipher / NLFSR / Cube attack / Stream ciphers / Cryptography / Trivium

Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria

DocID: 13w9s - View Document

Keystream / Linear feedback shift register / NLFSR / Correlation attack / QUAD / Stream ciphers / Cryptography / Grain

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

DocID: 136j8 - View Document