The following pages link to (Q2707396):
Displaying 50 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- A comparison of cryptanalytic tradeoff algorithms (Q380959) (← links)
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time (Q451122) (← links)
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function (Q456133) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Optimising Gröbner bases on Bivium (Q626947) (← links)
- FAN: a lightweight authenticated cryptographic algorithm (Q826267) (← links)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers (Q963420) (← links)
- Instant ciphertext-only cryptanalysis of GSM encrypted communication (Q1021231) (← links)
- A fast correlation attack on LILI-128 (Q1603511) (← links)
- Fast near collision attack on the Grain v1 stream cipher (Q1648861) (← links)
- Some results on Fruit (Q1727353) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (Q1749800) (← links)
- Cryptanalysis of the stream cipher LEX (Q1949239) (← links)
- The cost of false alarms in Hellman and rainbow tradeoffs (Q1960220) (← links)
- Efficient deterministic and non-deterministic pseudorandom number generation (Q1996941) (← links)
- Optimal parameters for the WG stream cipher family (Q2016392) (← links)
- Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack (Q2025386) (← links)
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a (Q2115734) (← links)
- Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers (Q2121015) (← links)
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 (Q2170080) (← links)
- The function-inversion problem: barriers and opportunities (Q2175919) (← links)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem (Q2188960) (← links)
- Analysis of the perfect table fuzzy rainbow tradeoff (Q2336696) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- CAR30: a new scalable stream cipher with rule 30 (Q2392685) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149) (← links)
- Practical construction and analysis of pseudo-randomness primitives (Q2482337) (← links)
- Comparison of perfect table cryptanalytic tradeoff algorithms (Q2630712) (← links)
- Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU (Q2794508) (← links)
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks (Q2807196) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher (Q2945086) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- A New Algorithm for the Unbalanced Meet-in-the-Middle Problem (Q2958141) (← links)
- Loiss: A Byte-Oriented Stream Cipher (Q3005584) (← links)
- Analysis of the Parallel Distinguished Point Tradeoff (Q3104733) (← links)
- Practical Algebraic Attacks on the Hitag2 Stream Cipher (Q3399209) (← links)
- Attacking Bivium Using SAT Solvers (Q3502695) (← links)
- The Stream Cipher HC-128 (Q3510913) (← links)
- A New Attack on the LEX Stream Cipher (Q3600396) (← links)
- New Distinguishers Based on Random Mappings against Stream Ciphers (Q3600423) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- Certain Observations on ACORN v3 and the Implications to TMDTO Attacks (Q5055973) (← links)
- Extended BDD-Based Cryptanalysis of Keystream Generators (Q5452244) (← links)
- Revisiting Correlation-Immunity in Filter Generators (Q5452272) (← links)
- Some results on lightweight stream ciphers Fountain v1 \& lizard (Q6112235) (← links)
- Quantum time/memory/data tradeoff attacks (Q6146595) (← links)