scientific article; zbMATH DE number 1455088
From MaRDI portal
Publication:4484883
zbMATH Open0939.94532MaRDI QIDQ4484883FDOQ4484883
Authors: J. Dj. Golić
Publication date: 5 June 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (48)
- Cryptanalysis of the Stream Cipher DECIM
- Cryptanalysis of the loiss stream cipher
- Extended BDD-Based Cryptanalysis of Keystream Generators
- Fast Software Encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
- Linear cryptanalysis of FASER128/256 and TriviA-ck
- A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions
- Affine linear cryptanalysis
- Modified alternating step generators with non-linear scrambler
- Selected Areas in Cryptography
- Security of a Keystream Cipher with Secret Initial Value
- Cryptanalysis of the Stream Cipher ABC v2
- Differential power analysis of stream ciphers with LFSRs
- Cryptanalysis of TWOPRIME
- Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers
- Title not available (Why is that?)
- Analysis and design of stream ciphers
- Title not available (Why is that?)
- Linear Cryptanalysis of the TSC Family of Stream Ciphers
- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Decrypting a Stream Cipher Based on J–K Flip-Flops
- Comments on L. J. García-Villalba and M. C. Rodríguez-Palánquex, A family of keystream generators with large linear complexity, Appl. Math. Lett. 14, No.5, 545-547 (2001; Zbl 0995.94031)
- Title not available (Why is that?)
- On graph algorithms for degeneracy test and recursive description of stream ciphers
- Title not available (Why is that?)
- Correlated Keystreams in Moustique
- Fast Software Encryption
- Linear models for a time-variant permutation generator
- On the calculation of the linear equivalence bias of jump controlled linear finite state machines
- New cryptanalysis of irregularly decimated stream ciphers
- Statistical distinguishers for irregularly decimated linear recurring sequences
- Title not available (Why is that?)
- Cryptanalysis of three mutually clock-controlled stop/go shift registers
- Title not available (Why is that?)
- Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
- Crypt analysis of two time pads in case of compressed speech
- Linear attacks on stream ciphers
- An overview of distinguishing attacks on stream ciphers
- Improved Cryptanalysis of MAG
- Title not available (Why is that?)
- On the existence of secure keystream generators
- Analysis of SSC2
- Linear models for keystream generators
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484883)