An approach for stream ciphers design based on joint computing over random and secret data
From MaRDI portal
Publication:2390944
DOI10.1007/S00607-009-0035-XzbMATH Open1172.94009OpenAlexW2000599680WikidataQ121263247 ScholiaQ121263247MaRDI QIDQ2390944FDOQ2390944
Hideki Imai, Miodrag J. Mihaljević
Publication date: 10 August 2009
Published in: Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00607-009-0035-x
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- : Increasing the Security and Efficiency of
- How to Encrypt with the LPN Problem
- Title not available (Why is that?)
- A cryptanalytic time-memory trade-off
- The Wire-Tap Channel
- $\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher
- Modeling Block Decoding Approaches for the Fast Correlation Attack
- ERROR-CORRECTING CODES AND CRYPTOGRAPHY PART I
- Efficient homophonic coding
- Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
Cited In (3)
Uses Software
This page was built for publication: An approach for stream ciphers design based on joint computing over random and secret data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2390944)