The following pages link to Trivium (Q18284):
Displaying 38 items.
- Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing (Q2513347) (← links)
- Analyzing Boolean functions via solving parametric polynomial systems (Q2661917) (← links)
- A necessary and sufficient condition for a class of nonsingular Galois NFSRs (Q2667091) (← links)
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums (Q2692351) (← links)
- The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited (Q2701496) (← links)
- Flaws in the Initialisation Process of Stream Ciphers (Q2790423) (← links)
- Advanced Algebraic Attack on Trivium (Q2807844) (← links)
- (Q2883180) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Conditional Differential Cryptanalysis of Trivium and KATAN (Q2889871) (← links)
- Remote IP Protection Using Timing Channels (Q2942840) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Attacking Bivium and Trivium with the Characteristic Set Method (Q3011904) (← links)
- Breaking Grain-128 with Dynamic Cube Attacks (Q3013083) (← links)
- Hill Climbing Algorithms and Trivium (Q3084244) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- Hardware optimizations of stream cipher rabbit (Q3118007) (← links)
- Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme (Q3176341) (← links)
- Numerical solvers and cryptanalysis (Q3400069) (← links)
- CASca:A CA Based Scalable Stream Cipher (Q3449411) (← links)
- (Q3450001) (← links)
- Cryptanalysis of Full Sprout (Q3457133) (← links)
- Comparison of Cube Attacks Over Different Vector Spaces (Q3460109) (← links)
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers (Q3506384) (← links)
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles (Q3506887) (← links)
- Cube Attacks on Tweakable Black Box Polynomials (Q3627440) (← links)
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers (Q3644200) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- A survey on implementation of lightweight block ciphers for resource constraints devices (Q5043892) (← links)
- Cube Attack on Stream Ciphers using a Modified Linearity Test (Q5069680) (← links)
- On black-box optimization in divide-and-conquer SAT solving (Q5085259) (← links)
- (Q5109519) (← links)
- Secure Communication Systems Based on the Synchronization of Chaotic Systems (Q5215346) (← links)
- A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters (Q5275037) (← links)
- Slid Pairs in Salsa20 and Trivium (Q5504605) (← links)
- Floating Fault Analysis of Trivium (Q5504626) (← links)
- Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks (Q5507406) (← links)
- Algebraic Attacks on Clock-Controlled Stream Ciphers (Q5757719) (← links)