Cited in
(30)- Algebraic Attacks on Clock-Controlled Stream Ciphers
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- On guess and determine analysis of Rabbit
- Hardware optimizations of stream cipher Rabbit
- CAR30: a new scalable stream cipher with rule 30
- Hardware framework for the rabbit stream cipher
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Cryptanalysis of Loiss stream cipher -- revisited
- Discretization of coupled map lattices for a stream cipher
- On black-box optimization in divide-and-conquer SAT solving
- Greedy distinguishers and nonrandomness detectors
- Salsa20
- CAR30
- MICKEY
- SOSEMANUK
- BLAKE
- eSTREAM
- CASca
- Grain
- MaD2
- SNOW
- tuftests
- Edon80
- Bug attacks
- Synthetic linear analysis with applications to CubeHash and Rabbit
- The hash function \texttt{BLAKE}
- Cryptanalysis of the two-dimensional circulation encryption algorithm
- Rabbit: a new high-performance stream cipher.
- A trinomial type of -LFSR oriented toward software implementation
- CASca: a CA based scalable stream cipher
This page was built for software: Rabbit