SNOW
From MaRDI portal
Software:31381
swMATH19554MaRDI QIDQ31381FDOQ31381
Author name not available (Why is that?)
Cited In (35)
- Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata
- Higher order differentiation over finite fields with applications to generalising the cube attack
- A general mixing strategy for the ECB-Mix-ECB mode of operation
- Randomized nonlinear software-oriented MDS diffusion layers
- On modes of operations of a block cipher for authentication and authenticated encryption
- Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs
- Implementing Grover oracles for quantum key search on AES and LowMC
- The method for constructing uniform planar approximations of the filter generator
- QUAD: A multivariate stream cipher with provable security
- Cryptographic properties of cyclic binary matrices
- Title not available (Why is that?)
- Cryptanalysis of the FLIP Family of Stream Ciphers
- A triangular class of skew maximum-period polynomials
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- Revisit two memoryless state-recovery cryptanalysis methods on A5/1
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
- A correlation attack on full SNOW-V and SNOW-Vi
- A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field
- Differential Fault Analysis of Sosemanuk
- Designing integrated accelerator for stream ciphers with structural similarities
- Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Guess-and-determine attacks on SNOW-Vi stream cipher
- Fast Correlation Attacks: Methods and Countermeasures
- Deterministic chaotic finite-state automata
- An overview of distinguishing attacks on stream ciphers
- HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers
- On algebraic immunity of trace inverse functions on finite fields of characteristic two
- Multidimensional linear distinguishing attacks and Boolean functions
- When lagged Fibonacci generators jump
- Linear Approximations of Addition Modulo 2n-1
- Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
- The Software Performance of Authenticated-Encryption Modes
This page was built for software: SNOW