Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Paper Fault attacks on stream cipher Scream 2018-12-07 Paper Combined cache timing attacks and template attacks on stream cipher MUGI 2018-12-07 Paper Two...
    10 bytes (17 words) - 13:34, 11 December 2023
  • Initialisation Process of Stream Ciphers 2016-03-04 Paper Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher 2015-09-09 Paper...
    10 bytes (17 words) - 15:51, 10 December 2023
  • Mir-1: A T-Function-Based Stream Cipher 2008-12-21 Paper A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher 2008-12-21 Paper Impossible...
    10 bytes (16 words) - 12:52, 6 October 2023
  • Sequence Is Enough to Break Stream Cipher LILI-128 2008-12-21 Paper Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher 2008-12-21 Paper A Distinguishing...
    10 bytes (16 words) - 13:38, 28 January 2024
  • Sequence Is Enough to Break Stream Cipher LILI-128 2008-12-21 Paper Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher 2008-12-21 Paper A Distinguishing...
    10 bytes (16 words) - 08:06, 7 October 2023
  • Paper Fault attacks on stream cipher Scream 2018-12-07 Paper Combined cache timing attacks and template attacks on stream cipher MUGI 2018-12-07 Paper...
    10 bytes (16 words) - 12:50, 6 October 2023
  • Discretization of coupled map lattices for a stream cipher 2012-10-05 Paper Gemstone: A New Stream Cipher Using Coupled Map Lattice 2010-11-23 Paper...
    10 bytes (16 words) - 08:11, 7 October 2023
  • GGHN stream cipher 2010-04-12 Paper Differential Fault Analysis of Rabbit 2009-12-09 Paper A new distinguishing and key recovery attack on NGG stream cipher...
    10 bytes (16 words) - 21:14, 22 September 2023
  • Publication Type Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors 2018-05-09 Paper Fast Hashing and Stream Encryption with Panama 2018-05-09...
    10 bytes (20 words) - 00:52, 28 December 2023
  • Discretization of coupled map lattices for a stream cipher 2012-10-05 Paper Gemstone: A New Stream Cipher Using Coupled Map Lattice 2010-11-23 Paper Designing...
    10 bytes (16 words) - 02:37, 7 October 2023
  • Publication Date of Publication Type Fast correlation attack on stream cipher ABC v3 2014-07-21 Paper Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC 2009-05-12...
    10 bytes (16 words) - 14:18, 24 September 2023
  • Cryptanalysis of Block Ciphers 2009-09-29 Paper Distinguishing Attacks on the Stream Cipher Py 2009-04-02 Paper New Attacks on the Stream Cipher TPy6 and Design...
    10 bytes (16 words) - 19:01, 6 October 2023
  • security of designing a cellular automata based stream cipher 2017-08-25 Paper CASca:A CA Based Scalable Stream Cipher 2015-11-04 Paper Preventing Fault Attacks...
    10 bytes (16 words) - 18:50, 24 September 2023
  • Paper An efficient cryptosystem delta for stream cipher applications 2009-04-17 Paper Mixer–a new stream cipher 2008-08-26 Paper Applied Cryptography and...
    10 bytes (18 words) - 03:57, 25 September 2023
  • Cellular Automata-Based Stream Ciphers 2010-01-14 Paper Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher 2009-06-25 Paper On the...
    10 bytes (16 words) - 11:59, 7 October 2023
  • Mir-1: A T-Function-Based Stream Cipher 2008-12-21 Paper A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher 2008-12-21 Paper Impossible...
    10 bytes (16 words) - 08:06, 7 October 2023
  • INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG 2009-08-26 Paper Highly Reliable Synchronous Stream Cipher System for Link Encryption 2009-02-10...
    10 bytes (16 words) - 15:20, 6 October 2023
  • 2008-04-04 Paper Cryptanalysis of the Stream Cipher ABC v2 2007-11-29 Paper Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy 2007-11-29 Paper...
    10 bytes (17 words) - 20:35, 24 September 2023
  • 2022-06-29 Paper An AEAD variant of the Grain stream cipher 2019-10-14 Paper Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials...
    10 bytes (16 words) - 02:16, 25 September 2023
  • multivariate stream cipher with provable security 2009-10-16 Paper Cryptanalysis of Grain 2009-04-02 Paper On the Security of IV Dependent Stream Ciphers 2008-09-16...
    10 bytes (16 words) - 06:00, 7 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)