The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Keystream with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1996 (17) 1997-2000 (15) 2001-2002 (23) 2003-2004 (27) 2005 (25) 2006 (32) 2007 (27) 2008 (21) 2009-2011 (15) 2012-2017 (16) 2018-2023 (16)
Publication types (Num. hits)
article(55) incollection(6) inproceedings(173)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 329 occurrences of 105 keywords

Results
Found 234 publication records. Showing 234 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation
74Manhee Lee, Minseon Ahn, Eun Jung Kim 0001 I2SEMS: Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems. Search on Bibsonomy PACT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
74Jovan Dj. Golic, Renato Menicocci Statistical distinguishers for irregularly decimated linear recurring sequences. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Matthias Krause 0001 OBDD-Based Cryptanalysis of Oblivious Keystream Generators. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
73Matthias Krause 0001 BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
73Andrew Klapper On the Existence of Secure Keystream Generators. Search on Bibsonomy J. Cryptol. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
71Subhamoy Maitra, Goutam Paul 0001 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream
71Xiaomin Wang, Jiashu Zhang, Wenfang Zhang Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Nonlinear digital filter, Chaos, Cryptology, Keystream
71Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz Towards a General RC4-Like Keystream Generator. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random shuffle, stream ciphers, RC4, keystream generator
71Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel A New Keystream Generator MUGI. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF PANAMA, Re-synchronization attack, Block cipher, Related-key attack, Keystream generator
61Håkan Englund, Martin Hell, Thomas Johansson 0001 Two General Attacks on Pomaranch-Like Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch
60Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
60Leonie Ruth Simpson, Matthew Henricksen Improved Cryptanalysis of MAG. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery
60Paul Camion, Miodrag J. Mihaljevic, Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators
58Subhamoy Maitra, Goutam Paul 0001 Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream
50Yi Lu 0002, Serge Vaudenay Cryptanalysis of an E0-like Combiner with Memory. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF E0, Stream cipher, Bluetooth, Correlation, Combiner
50Risto M. Hakala, Kaisa Nyberg Linear Distinguishing Attack on Shannon. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon
50Martin Hell, Thomas Johansson 0001 Two New Attacks on the Self-Shrinking Generator. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Hongjun Wu 0001, Bart Preneel Cryptanalysis of the Stream Cipher DECIM. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Berndt M. Gammel, Rainer Göttfert, O. Kniffler An NLFSR-based stream cipher. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Jovan Dj. Golic, Renato Menicocci Correlation Analysis of the Alternating Step Generator. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stop/go clocking, stream ciphers, fast correlation attacks, time-varying channels
50Jovan Dj. Golic Cryptanalysis of Alleged A5 Stream Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
48Dirk Stegemann Extended BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain
48Matthias Krause 0001, Dirk Stegemann Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator
48David M. Horan, Richard A. Guinee A novel pseudorandom binary sequence generator for keystream generation. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Amparo Fúster-Sabater, Dolores de la Guía-Martínez Keystream Generator Analysis in Terms of Cellular Automata. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, cellular automata, shrinking generator
48Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee 0001, William Millan, Sang-Jae Moon, Leonie Simpson The LILI-II Keystream Generator. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
48Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan LILI Keystream Generator. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Scott R. Fluhrer, David A. McGrew Statistical Analysis of the Alleged RC4 Keystream Generator. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Jovan Dj. Golic Linear Statistical Weakness of Alleged RC4 Keystream Generator. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
48Jovan Dj. Golic Intrinsic Statistical Weakness of Keystream Generators. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield A natural language approach to automated cryptanalysis of two-time pads. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF keystream reuse, stream cipher, one-time pad
47Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators
47Hoon-Jae Lee 0001 Highly Reliable Synchronous Stream Cipher System for Link Encryption. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF synchronization, stream cipher, randomness, Keystream
47Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF stream ciphers, decoding, linear feedback shift registers, fast correlation attack, keystream generators
46Jovan Dj. Golic Linear Models for Keystream Generators. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Clock-controlled shift registers, cryptography, correlation coefficients, linear models, keystream generators
37Ed Dawson, Matthew Henricksen, Leonie Simpson The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher
37Sondre Rønjom, Tor Helleseth A New Attack on the Filter Generator. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Bin Zhang 0003, Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR)
37Côme Berbain, Henri Gilbert, Alexander Maximov Cryptanalysis of Grain. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Correlation attack, Walsh transform
37Côme Berbain, Henri Gilbert, Jacques Patarin QUAD: A Practical Stream Cipher with Provable Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Yong Zhang 0023, Xiamu Niu, Juncao Li, Chun-ming Li Research on a Novel Hashing Stream Cipher. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Information security, Hash function
37Elad Barkan, Eli Biham Conditional Estimators: An Effective Attack on A5/1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
37Håkan Englund, Alexander Maximov Attack the Dragon. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
37Se Ah Choi, Kyeongcheol Yang Balanced Shrinking Generators. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Period, Linear Complexity, Balancedness, Statistical Properties, Shrinking Generator, Self-Shrinking Generator
37Scott R. Fluhrer, Stefan Lucks Analysis of the E0 Encryption System. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Jovan Dj. Golic Correlation Analysis of the Shrinking Generator. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities
37Andrew Klapper On the Existence of Secure Feedback Registers (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF nonlinear feedback registers, security, cryptography, stream ciphers, Binary sequences
36Wang Yingsong, Chen Wei f8 Keystream Generator with SMS4 as Core Algorithm. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Itsik Mantin Predicting and Distinguishing Attacks on RC4 Keystream Generator. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks
36Håvard Molland Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF irregular clocked generators, linear consistency test, Stream ciphers
36Souradyuti Paul, Bart Preneel A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Yi Lu 0002, Serge Vaudenay Faster Correlation Attack on Bluetooth Keystream Generator E0. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Håvard Molland, Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack
36Harald Niederreiter The Linear Complexity Profile and the Jump Complexity of Keystream Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
35Amparo Fúster-Sabater, Pino Caballero-Gil Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interleaved sequence, cryptanalysis, Keystream generator, shrinking generator
35Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators
35Jovan Dj. Golic, Andrew J. Clark, Ed Dawson Generalized Inversion Attack on Nonlinear Filter Generators. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF critical branching processes, inversion of finite automata, Boolean functions, Binary trees, keystream generators
25Bin Zhang 0003 New Cryptanalysis of Irregularly Decimated Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Goutam Paul 0001, Siddheshwar Rathi, Subhamoy Maitra On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
25Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack
25Alexander Maximov, Thomas Johansson 0001 A Linear Distinguishing Attack on Scream. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Sondre Rønjom, Tor Helleseth Attacking the Filter Generator over GF (2 m ). Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF solving nonlinear equations, Boolean functions, m-sequences, Filter generators
25Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima Distinguishing Attack Against TPypy. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM
25Côme Berbain, Henri Gilbert On the Security of IV Dependent Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IV setup, stream cipher, provable security, PRNG
25Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decoding problem, cryptanalysis, correlation attacks, distinguisher, grain
25Hongjun Wu 0001, Bart Preneel Cryptanalysis of the Stream Cipher ABC v2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-dependent S-box, ABC v2, stream cipher, Fast correlation attack
25Hongjun Wu 0001, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
25Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Jaeheon Kim, Deukjo Hong Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fast correlation attack, Shrinking generator, Self-Shrinking generator, Clock-controlled generator
25Frederik Armknecht, Gwénolé Ars Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Anne Canteaut Open Problems Related to Algebraic Attacks on Stream Ciphers. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Pino Caballero-Gil, Amparo Fúster-Sabater Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. Search on Bibsonomy EUROCAST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Joo Yeon Cho, Josef Pieprzyk Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER-t32, SOBER-t16, stream ciphers, linearization, Algebraic attack, NESSIE, modular addition, multivariate equations
25Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Security Analysis of the Generalized Self-shrinking Generator. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, Linear feedback shift register, Fast correlation attack, Clock control, Self-shrinking generator
25Frederik Armknecht, Matthias Krause 0001 Algebraic Attacks on Combiners with Memory. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari Linear Cryptanalysis of Bluetooth Stream Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis
25Erik Zenner, Matthias Krause 0001, Stefan Lucks Improved Cryptanalysis of the Self-Shrinking Generator. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Serge Mister, Stafford E. Tavares Cryptanalysis of RC4-like Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Jovan Dj. Golic, Luke O'Connor Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
25Thomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
24Çagdas Gül, Orhun Kara A New Construction Method for Keystream Generators. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Noshin A. Sabuwala, Rohin D. Daruwala An Approach Utilizing a Random Keystream Generator to Enhance the Security of Unmanned Aerial Vehicles. Search on Bibsonomy TENCON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. Search on Bibsonomy ACISP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Anirudh M. Sivapriya, Dilip Kumar Barman, K. K. Soundra Pandian A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application. Search on Bibsonomy PKIA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong Algebraic Attacks on Grain-Like Keystream Generators. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24David A. August, Anne C. Smith PudgyTurtle: Using Keystream to Encode and Encrypt. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Edwin A. Umoh, Ogechukwu N. Iloanusi, Uche A. Nnolim Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform. Search on Bibsonomy IET Image Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24David A. August, Anne C. Smith PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Maria Eichlseder, Marcel Nageler, Robert Primas Analyzing the Linear Keystream Biases in AEGIS. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
24Maria Eichlseder, Marcel Nageler, Robert Primas Analyzing the Linear Keystream Biases in AEGIS. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Zhaneta Savova-Tasheva, Antoniya Tasheva Analysis of Keystream Produced by Generalized Shrinking Multiplexing Generator Controlled by Ternary m-sequence. Search on Bibsonomy BCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24J. Gayathri, S. Subashini A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Brice Minaud Linear Biases in AEGIS Keystream. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Sabyasachi Dey 0001, Santanu Sarkar 0001 Generalization of Roos bias in RC4 and some results on key-keystream relations. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Youssef Harmouch, Rachid El Kouch A chaotic keystream generation for stream cipher. Search on Bibsonomy LOPAL The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 234 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license