An approach for stream ciphers design based on joint computing over random and secret data
From MaRDI portal
(Redirected from Publication:2390944)
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1024063 (Why is no real title available?)
- scientific article; zbMATH DE number 2081058 (Why is no real title available?)
- $\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher
- : Increasing the Security and Efficiency of
- A cryptanalytic time-memory trade-off
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- ERROR-CORRECTING CODES AND CRYPTOGRAPHY PART I
- Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
- Efficient homophonic coding
- How to Encrypt with the LPN Problem
- Modeling Block Decoding Approaches for the Fast Correlation Attack
- The Wire-Tap Channel
Cited in
(3)
This page was built for publication: An approach for stream ciphers design based on joint computing over random and secret data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2390944)