The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Bivium with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2008-2019 (13)
Publication types (Num. hits)
article(5) inproceedings(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10 occurrences of 8 keywords

Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
144Julia Borghoff, Lars R. Knudsen, Mathias Stolpe Bivium as a Mixed-Integer Linear Programming Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
93Tobias Eibach, Enrico Pilz, Gunnar Völkel Attacking Bivium Using SAT Solvers. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rsat, Bivium, Gröbner Base, Cryptography, Application, Stream Cipher, BDD, SAT Solver, eSTREAM, Trivium
66Zainab Noferesti, Neda Rohani, Javad Mohajeri, Mohammad Reza Aref Distinguishing Attack on Bivium. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Bivium, stream cipher, distinguishing attack, eSTREAM
33Shravani Shahapure, Virendra Sule, Rohin D. Daruwala Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM. Search on Bibsonomy SPACE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Virendra Sule, Anmol Yadav Cryptanalysis of Bivium using a Boolean all solution solver. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
33Shiyong Zhang, Gongliang Chen, Jianhua Li 0001 Cube attack on reduced-round Enhanced-Bivium. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref Guess and Determine Attack on Bivium. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Zhenyu Huang 0004, Dongdai Lin Attacking Bivium and Trivium with the Characteristic Set Method. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Tobias Eibach, Gunnar Völkel, Enrico Pilz Optimising Gröbner Bases on Bivium. Search on Bibsonomy Math. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Kenneth Koon-Ho Wong, Gregory V. Bard Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
33Kenneth Koon-Ho Wong, Gregory V. Bard Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Michael Vielhaber 0001 AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
28Baiqiang Chen Strategies on Algebraic Attacks Using SAT Solvers. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #13 of 13 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license