The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Lili-128 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2015 (15)
Publication types (Num. hits)
article(6) inproceedings(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 24 occurrences of 18 keywords

Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
156Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu Shorter bit sequence is enough to break stream cipher LILI-128. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
137Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
110Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
110Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
87Håkan Englund, Thomas Johansson 0001 A New Distinguisher for Clock Controlled Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Markku-Juhani Olavi Saarinen A Time-Memory Tradeoff Attack Against LILI-128. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Håkan Englund, Thomas Johansson 0001 A New Simple Technique to Attack Filter Generators and Related Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Dibyendu Roy 0001, Sourav Mukhopadhyay Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
46Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul 0001, Hideki Imai Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
46Xiangao Huang, Wei Huang, Xiaozhou Liu, Chao Wang, Zhu jing Wang, Tao Wang Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
46Fredrik Jönsson, Thomas Johansson 0001 A fast correlation attack on LILI-128. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Markku-Juhani Olavi Saarinen A Time-Memory Tradeoff Attack Against LILI-128. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
28Nicolas T. Courtois Algebraic Attacks on Combiners with Memory and Several Outputs. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Frederik Armknecht, Matthias Krause 0001 Algebraic Attacks on Combiners with Memory. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Eric Filiol A New Statistical Testing for Symmetric Ciphers and Hash Functions. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Möbius transform, Boolean function, hash function, randomness, statistical testing, Walsh Transform, symmetric cipher
Displaying result #1 - #15 of 15 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license