LEX
From MaRDI portal
Software:31411
No author found.
Related Items (17)
ASC-1: An Authenticated Encryption Stream Cipher ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Whirlwind: a new cryptographic hash function ⋮ Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17--18, 2006. Revised selected papers. ⋮ Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers ⋮ Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15--17, 2006. Revised selected papers. ⋮ Cryptanalysis of the stream cipher LEX ⋮ Efficient Design Strategies Based on the AES Round Function ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ Advances in cryptology -- ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7--11, 2008. Proceedings ⋮ Differential Fault Analysis of LEX ⋮ A New Attack on the LEX Stream Cipher ⋮ Improved single-key attacks on 8-round AES-192 and AES-256 ⋮ Resynchronization Attacks on WG and LEX ⋮ Accelerating AES with Vector Permute Instructions ⋮ An overview of distinguishing attacks on stream ciphers ⋮ New AES Software Speed Records
This page was built for software: LEX