SNOW
From MaRDI portal
Software:31381
swMATH19554MaRDI QIDQ31381FDOQ31381
Author name not available (Why is that?)
Cited In (35)
- Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata
- MaD2: an ultra-performance stream cipher for pervasive data encryption
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Cryptanalysis of the FLIP family of stream ciphers
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- Randomized nonlinear software-oriented MDS diffusion layers
- On modes of operations of a block cipher for authentication and authenticated encryption
- Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs
- Implementing Grover oracles for quantum key search on AES and LowMC
- The method for constructing uniform planar approximations of the filter generator
- QUAD: A multivariate stream cipher with provable security
- Cryptographic properties of cyclic binary matrices
- Title not available (Why is that?)
- Differential fault analysis of Sosemanuk
- A triangular class of skew maximum-period polynomials
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- Revisit two memoryless state-recovery cryptanalysis methods on A5/1
- Hipacc-LTE: an integrated high performance accelerator for 3GPP LTE stream ciphers
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
- A correlation attack on full SNOW-V and SNOW-Vi
- A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field
- Designing integrated accelerator for stream ciphers with structural similarities
- Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
- The software performance of authenticated-encryption modes
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Guess-and-determine attacks on SNOW-Vi stream cipher
- Fast Correlation Attacks: Methods and Countermeasures
- Deterministic chaotic finite-state automata
- An overview of distinguishing attacks on stream ciphers
- On algebraic immunity of trace inverse functions on finite fields of characteristic two
- Multidimensional linear distinguishing attacks and Boolean functions
- When lagged Fibonacci generators jump
- Linear Approximations of Addition Modulo 2n-1
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
This page was built for software: SNOW