Pages that link to "Item:Q3506887"
From MaRDI portal
The following pages link to Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles (Q3506887):
Displayed 30 items.
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (Q517727) (← links)
- Stream/block ciphers, difference equations and algebraic attacks (Q820950) (← links)
- Differential fault based key recovery attacks on TRIAD (Q831667) (← links)
- Speeding up the GVW algorithm via a substituting method (Q1730310) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (Q2057178) (← links)
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems (Q2104459) (← links)
- Improved transformation algorithms for generalized Galois NLFSRs (Q2130039) (← links)
- Grain-128AEADv2: strengthening the initialization against key reconstruction (Q2149811) (← links)
- High order differential attacks on stream ciphers (Q2376658) (← links)
- Search heuristics and the influence of non-perfect randomness: examining genetic algorithms and simulated annealing (Q2513347) (← links)
- Analyzing Boolean functions via solving parametric polynomial systems (Q2661917) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Conditional Differential Cryptanalysis of Trivium and KATAN (Q2889871) (← links)
- Remote IP Protection Using Timing Channels (Q2942840) (← links)
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks (Q2946893) (← links)
- Breaking Grain-128 with Dynamic Cube Attacks (Q3013083) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme (Q3176341) (← links)
- Numerical solvers and cryptanalysis (Q3400069) (← links)
- CASca:A CA Based Scalable Stream Cipher (Q3449411) (← links)
- Cryptanalysis of Full Sprout (Q3457133) (← links)
- Comparison of Cube Attacks Over Different Vector Spaces (Q3460109) (← links)
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers (Q3506384) (← links)
- Cube Attacks on Tweakable Black Box Polynomials (Q3627440) (← links)
- A survey on implementation of lightweight block ciphers for resource constraints devices (Q5043892) (← links)
- Cube Attack on Stream Ciphers using a Modified Linearity Test (Q5069680) (← links)
- (Q5109519) (← links)
- A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters (Q5275037) (← links)