Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation |
74 | Manhee Lee, Minseon Ahn, Eun Jung Kim 0001 |
I2SEMS: Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems. |
PACT |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Jovan Dj. Golic, Renato Menicocci |
Statistical distinguishers for irregularly decimated linear recurring sequences. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
73 | Matthias Krause 0001 |
OBDD-Based Cryptanalysis of Oblivious Keystream Generators. |
Theory Comput. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
73 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
73 | Matthias Krause 0001 |
BDD-Based Cryptanalysis of Keystream Generators. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
73 | Andrew Klapper |
On the Existence of Secure Keystream Generators. |
J. Cryptol. |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Subhamoy Maitra, Goutam Paul 0001 |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream |
71 | Xiaomin Wang, Jiashu Zhang, Wenfang Zhang |
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Nonlinear digital filter, Chaos, Cryptology, Keystream |
71 | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz |
Towards a General RC4-Like Keystream Generator. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
random shuffle, stream ciphers, RC4, keystream generator |
71 | Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel |
A New Keystream Generator MUGI. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
PANAMA, Re-synchronization attack, Block cipher, Related-key attack, Keystream generator |
61 | Håkan Englund, Martin Hell, Thomas Johansson 0001 |
Two General Attacks on Pomaranch-Like Keystream Generators. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch |
60 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
60 | Leonie Ruth Simpson, Matthew Henricksen |
Improved Cryptanalysis of MAG. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery |
60 | Paul Camion, Miodrag J. Mihaljevic, Hideki Imai |
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators |
58 | Subhamoy Maitra, Goutam Paul 0001 |
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream |
50 | Yi Lu 0002, Serge Vaudenay |
Cryptanalysis of an E0-like Combiner with Memory. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
E0, Stream cipher, Bluetooth, Correlation, Combiner |
50 | Risto M. Hakala, Kaisa Nyberg |
Linear Distinguishing Attack on Shannon. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon |
50 | Martin Hell, Thomas Johansson 0001 |
Two New Attacks on the Self-Shrinking Generator. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Hongjun Wu 0001, Bart Preneel |
Cryptanalysis of the Stream Cipher DECIM. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Berndt M. Gammel, Rainer Göttfert, O. Kniffler |
An NLFSR-based stream cipher. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Jovan Dj. Golic, Renato Menicocci |
Correlation Analysis of the Alternating Step Generator. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
stop/go clocking, stream ciphers, fast correlation attacks, time-varying channels |
50 | Jovan Dj. Golic |
Cryptanalysis of Alleged A5 Stream Cipher. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
48 | Dirk Stegemann |
Extended BDD-Based Cryptanalysis of Keystream Generators. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain |
48 | Matthias Krause 0001, Dirk Stegemann |
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator |
48 | David M. Horan, Richard A. Guinee |
A novel pseudorandom binary sequence generator for keystream generation. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Amparo Fúster-Sabater, Dolores de la Guía-Martínez |
Keystream Generator Analysis in Terms of Cellular Automata. |
KES |
2003 |
DBLP DOI BibTeX RDF |
cryptography, cellular automata, shrinking generator |
48 | Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee 0001, William Millan, Sang-Jae Moon, Leonie Simpson |
The LILI-II Keystream Generator. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan |
LILI Keystream Generator. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Scott R. Fluhrer, David A. McGrew |
Statistical Analysis of the Alleged RC4 Keystream Generator. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Jovan Dj. Golic |
Linear Statistical Weakness of Alleged RC4 Keystream Generator. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
48 | Jovan Dj. Golic |
Intrinsic Statistical Weakness of Keystream Generators. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
47 | Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield |
A natural language approach to automated cryptanalysis of two-time pads. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
keystream reuse, stream cipher, one-time pad |
47 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators |
47 | Hoon-Jae Lee 0001 |
Highly Reliable Synchronous Stream Cipher System for Link Encryption. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
synchronization, stream cipher, randomness, Keystream |
47 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
stream ciphers, decoding, linear feedback shift registers, fast correlation attack, keystream generators |
46 | Jovan Dj. Golic |
Linear Models for Keystream Generators. |
IEEE Trans. Computers |
1996 |
DBLP DOI BibTeX RDF |
Clock-controlled shift registers, cryptography, correlation coefficients, linear models, keystream generators |
37 | Ed Dawson, Matthew Henricksen, Leonie Simpson |
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong |
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher |
37 | Sondre Rønjom, Tor Helleseth |
A New Attack on the Filter Generator. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Bin Zhang 0003, Dengguo Feng |
New Guess-and-Determine Attack on the Self-Shrinking Generator. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR) |
37 | Côme Berbain, Henri Gilbert, Alexander Maximov |
Cryptanalysis of Grain. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Correlation attack, Walsh transform |
37 | Côme Berbain, Henri Gilbert, Jacques Patarin |
QUAD: A Practical Stream Cipher with Provable Security. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Yong Zhang 0023, Xiamu Niu, Juncao Li, Chun-ming Li |
Research on a Novel Hashing Stream Cipher. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Information security, Hash function |
37 | Elad Barkan, Eli Biham |
Conditional Estimators: An Effective Attack on A5/1. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
37 | Håkan Englund, Alexander Maximov |
Attack the Dragon. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Nicolas T. Courtois |
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations |
37 | Se Ah Choi, Kyeongcheol Yang |
Balanced Shrinking Generators. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Period, Linear Complexity, Balancedness, Statistical Properties, Shrinking Generator, Self-Shrinking Generator |
37 | Scott R. Fluhrer, Stefan Lucks |
Analysis of the E0 Encryption System. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Jovan Dj. Golic |
Correlation Analysis of the Shrinking Generator. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities |
37 | Andrew Klapper |
On the Existence of Secure Feedback Registers (Extended Abstract). |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
nonlinear feedback registers, security, cryptography, stream ciphers, Binary sequences |
36 | Wang Yingsong, Chen Wei |
f8 Keystream Generator with SMS4 as Core Algorithm. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Itsik Mantin |
Predicting and Distinguishing Attacks on RC4 Keystream Generator. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks |
36 | Håvard Molland |
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
irregular clocked generators, linear consistency test, Stream ciphers |
36 | Souradyuti Paul, Bart Preneel |
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Yi Lu 0002, Serge Vaudenay |
Faster Correlation Attack on Bluetooth Keystream Generator E0. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Håvard Molland, Tor Helleseth |
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack |
36 | Harald Niederreiter |
The Linear Complexity Profile and the Jump Complexity of Keystream Sequences. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
35 | Amparo Fúster-Sabater, Pino Caballero-Gil |
Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
interleaved sequence, cryptanalysis, Keystream generator, shrinking generator |
35 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Fast Correlation Attack Algorithm with List Decoding and an Application. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators |
35 | Jovan Dj. Golic, Andrew J. Clark, Ed Dawson |
Generalized Inversion Attack on Nonlinear Filter Generators. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
critical branching processes, inversion of finite automata, Boolean functions, Binary trees, keystream generators |
25 | Bin Zhang 0003 |
New Cryptanalysis of Irregularly Decimated Stream Ciphers. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Goutam Paul 0001, Siddheshwar Rathi, Subhamoy Maitra |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
25 | Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park |
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack |
25 | Alexander Maximov, Thomas Johansson 0001 |
A Linear Distinguishing Attack on Scream. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Sondre Rønjom, Tor Helleseth |
Attacking the Filter Generator over GF (2 m ). |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
solving nonlinear equations, Boolean functions, m-sequences, Filter generators |
25 | Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima |
Distinguishing Attack Against TPypy. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM |
25 | Côme Berbain, Henri Gilbert |
On the Security of IV Dependent Stream Ciphers. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
IV setup, stream cipher, provable security, PRNG |
25 | Alexander Maximov |
Cryptanalysis of the "Grain" family of stream ciphers. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
decoding problem, cryptanalysis, correlation attacks, distinguisher, grain |
25 | Hongjun Wu 0001, Bart Preneel |
Cryptanalysis of the Stream Cipher ABC v2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
key-dependent S-box, ABC v2, stream cipher, Fast correlation attack |
25 | Hongjun Wu 0001, Bart Preneel |
Resynchronization Attacks on WG and LEX. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack |
25 | Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Jaeheon Kim, Deukjo Hong |
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Fast correlation attack, Shrinking generator, Self-Shrinking generator, Clock-controlled generator |
25 | Frederik Armknecht, Gwénolé Ars |
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Anne Canteaut |
Open Problems Related to Algebraic Attacks on Stream Ciphers. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Pino Caballero-Gil, Amparo Fúster-Sabater |
Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. |
EUROCAST |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Joo Yeon Cho, Josef Pieprzyk |
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
SOBER-t32, SOBER-t16, stream ciphers, linearization, Algebraic attack, NESSIE, modular addition, multivariate equations |
25 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 |
Security Analysis of the Generalized Self-shrinking Generator. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Stream cipher, Linear feedback shift register, Fast correlation attack, Clock control, Self-shrinking generator |
25 | Frederik Armknecht, Matthias Krause 0001 |
Algebraic Attacks on Combiners with Memory. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari |
Linear Cryptanalysis of Bluetooth Stream Cipher. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis |
25 | Erik Zenner, Matthias Krause 0001, Stefan Lucks |
Improved Cryptanalysis of the Self-Shrinking Generator. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Serge Mister, Stafford E. Tavares |
Cryptanalysis of RC4-like Ciphers. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Jovan Dj. Golic, Luke O'Connor |
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Siegenthaler, Amstein Walthert Kleiner, Réjane Forré |
Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
24 | Çagdas Gül, Orhun Kara |
A New Construction Method for Keystream Generators. |
IEEE Trans. Inf. Forensics Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Noshin A. Sabuwala, Rohin D. Daruwala |
An Approach Utilizing a Random Keystream Generator to Enhance the Security of Unmanned Aerial Vehicles. |
TENCON |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong |
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. |
ACISP |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Anirudh M. Sivapriya, Dilip Kumar Barman, K. K. Soundra Pandian |
A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application. |
PKIA |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong |
Algebraic Attacks on Grain-Like Keystream Generators. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
24 | David A. August, Anne C. Smith |
PudgyTurtle: Using Keystream to Encode and Encrypt. |
SN Comput. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Edwin A. Umoh, Ogechukwu N. Iloanusi, Uche A. Nnolim |
Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform. |
IET Image Process. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | David A. August, Anne C. Smith |
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
24 | Maria Eichlseder, Marcel Nageler, Robert Primas |
Analyzing the Linear Keystream Biases in AEGIS. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
24 | Maria Eichlseder, Marcel Nageler, Robert Primas |
Analyzing the Linear Keystream Biases in AEGIS. |
IACR Trans. Symmetric Cryptol. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Zhaneta Savova-Tasheva, Antoniya Tasheva |
Analysis of Keystream Produced by Generalized Shrinking Multiplexing Generator Controlled by Ternary m-sequence. |
BCI |
2019 |
DBLP DOI BibTeX RDF |
|
24 | J. Gayathri, S. Subashini |
A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique. |
Multim. Tools Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei |
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. |
Secur. Commun. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Brice Minaud |
Linear Biases in AEGIS Keystream. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
24 | Sabyasachi Dey 0001, Santanu Sarkar 0001 |
Generalization of Roos bias in RC4 and some results on key-keystream relations. |
J. Math. Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Youssef Harmouch, Rachid El Kouch |
A chaotic keystream generation for stream cipher. |
LOPAL |
2018 |
DBLP DOI BibTeX RDF |
|