scientific article; zbMATH DE number 1951604

From MaRDI portal
Publication:4413853

zbMath1027.68596MaRDI QIDQ4413853

Thomas Johansson, Patrik Ekdahl

Publication date: 21 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950047.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (28)

A triangular class of skew maximum-period polynomialsOn modes of operations of a block cipher for authentication and authenticated encryptionDesigning integrated accelerator for stream ciphers with structural similaritiesA correlation attack on full SNOW-V and SNOW-ViHigher order differentiation over finite fields with applications to generalising the cube attackEfficient and extensive search for precise linear approximations with high correlations of full SNOW-VOn algebraic immunity of trace inverse functions on finite fields of characteristic twoSeveral MILP-Aided Attacks Against SNOW 2.0Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3GA method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element fieldOn Large Distributions for Linear CryptanalysisMultidimensional linear distinguishing attacks and Boolean functionsDifferential Fault Analysis of SosemanukFast Correlation Attacks: Methods and CountermeasuresThe Software Performance of Authenticated-Encryption ModesLinear Approximations of Addition Modulo 2n-1A general mixing strategy for the ECB-Mix-ECB mode of operationModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorCryptanalysis of Sosemanuk and SNOW 2.0 Using Linear MasksCryptographic properties of cyclic binary matricesUpper bounds on the imbalance of discrete functions implemented by sequences of finite automataQUAD: A multivariate stream cipher with provable securityDeterministic chaotic finite-state automataAn overview of distinguishing attacks on stream ciphersHiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream CiphersCryptanalysis of the FLIP Family of Stream CiphersDesign and Test of Pseudorandom Number Generator Using a Star Network of Lorenz OscillatorsThe method for constructing uniform planar approximations of the filter generator


Uses Software





This page was built for publication: