Design and analysis of small-state grain-like stream ciphers (Q1749794): Difference between revisions

From MaRDI portal
Changed an Item
Normalize DOI.
 
(8 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s12095-017-0261-6 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: KATAN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Grain / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Trivium / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: eSTREAM / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-017-0261-6 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2767998798 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q122732641 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Lightweight Stream Ciphers with Shorter Internal States / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some Results on Sprout / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional Estimators: An Effective Attack on A5/1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707396 / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Attacks on Tweakable Black Box Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736417 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and analysis of small-state grain-like stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Applications of Time Memory Data Tradeoffs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Full Sprout / rank
 
Normal rank
Property / cites work
 
Property / cites work: Degree evaluation of NFSR-based cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4274294 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Differential Fault Attack on Plantlet / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Evaluation by Generalized Integral Property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube attacks on non-blackbox polynomials based on division property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Tradeoff Attack on Sprout-Like Stream Ciphers / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S12095-017-0261-6 / rank
 
Normal rank

Latest revision as of 08:07, 11 December 2024

scientific article
Language Label Description Also known as
English
Design and analysis of small-state grain-like stream ciphers
scientific article

    Statements

    Design and analysis of small-state grain-like stream ciphers (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    28 May 2018
    0 references
    stream ciphers
    0 references
    lightweight cryptography
    0 references
    time-memory-data tradeoff attacks
    0 references
    grain
    0 references
    fruit
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers