The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for NLFSR with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2009 (15) 2010-2020 (16) 2021-2024 (6)
Publication types (Num. hits)
article(15) inproceedings(21) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 23 occurrences of 17 keywords

Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
143Pey-Chang Kent Lin, Sunil P. Khatri VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF NLFSR, stream cipher, pseudo-random sequence
89Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers
89Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decoding problem, cryptanalysis, correlation attacks, distinguisher, grain
66Elena Dubrova, Maxim Teslenko, Hannu Tenhunen On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Matthew Henricksen, Ed Dawson Rekeying Issues in the MUGI Stream Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MUGI, MUGI-M, key initialization, key agility, stream cipher
44Håkan Englund, Alexander Maximov Attack the Dragon. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
29Punam Kumari, Bhaskar Mondal Lightweight encryption with data and device integrity using NLFSR and PUF for the Internet of Medical Things. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
29Punam Kumari, Bhaskar Mondal Lightweight image encryption algorithm using NLFSR and CBC mode. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul 0001 Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
29Amit Jana, Mostafizar Rahman, Dhiman Saha DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
29Yujuan Li, Huaifu Wang, Peipei Zhou 0004, Guoshuang Zhang Some properties of the cycle decomposition of WG-NLFSR. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Ge Yao, Udaya Parampalli Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Zhaohui Xing, Wenying Zhang, Guoyong Han Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Ibraheem Al-Hejri, Sultan Almuhammadi Constructing New NLFSR Functions with Optimal Periods. Search on Bibsonomy Int. J. Interdiscip. Telecommun. Netw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Ge Yao Transformation and Security Analysis of NLFSR-based Stream Ciphers. Search on Bibsonomy 2020   RDF
29Ge Yao, Udaya Parampalli Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
29Sultan Almuhammadi, Ibraheem Al-Hejri, Ghashmi Bin Talib, Awadh Gaamel NLFSR Functions with Optimal Periods. Search on Bibsonomy ICCSA (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Navaneetha Krishna, V. Murugappan, R. Harish, M. Midhun, E. Prabhu Design of a novel reversible nlfsr. Search on Bibsonomy ICACCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Reza Sabbaghi-Nadooshan, Zahra Shahosseini, Davood Rezaeipour Design of New QCA LFSR and NLFSR for Grain-128 Stream Cipher. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Yuhei Watanabe, Yosuke Todo, Masakatu Morii New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. Search on Bibsonomy AsiaJCIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Yujuan Li, Wenhua Shen, Huaifu Wang, Peipei Zhou 0004 On the cycle decomposition of the WG-NLFSR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
29Guangyao Zhao, Lei Cheng, Chao Li 0002, Ruilin Li, Xuan Shen On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Zhiqiang Lin The Transformation from the Galois NLFSR to the Fibonacci Configuration. Search on Bibsonomy EIDWT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29 The Transformation from the Galois NLFSR to the Fibonacci Configuration. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
29Xu Guo, Xu Na A research of the Port-Hopping telecommunication techniques based on non-linear feedback shift register (NLFSR). Search on Bibsonomy ICAL The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Jean-Michel Chabloz, Shohreh Sharif Mansouri, Elena Dubrova An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence. Search on Bibsonomy SETA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Simon Knellwolf, Willi Meier, María Naya-Plasencia Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Wenling Wu, Lei Zhang 0012, Liting Zhang, Wentao Zhang Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
29Elena Dubrova How to speed-up your NLFSR-based stream cipher. Search on Bibsonomy DATE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Wenling Wu, Lei Zhang 0012, Liting Zhang, Wentao Zhang Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. Search on Bibsonomy ICICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Berndt M. Gammel, Rainer Göttfert, O. Kniffler An NLFSR-based stream cipher. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
22Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
22Andrey Bogdanov Linear Slide Attacks on the KeeLoq Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks
22Giorgos Dimitrakopoulos, Dimitris Nikolos, Dimitris Bakalis Bit-Serial Test Pattern Generation by an Accumulator Behaving as a Non-Linear Feedback Shift Register. Search on Bibsonomy IOLTW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Yves Roggeman Varying Feedback Shift Registers. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #37 of 37 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license