The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Trivium with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006-2008 (18) 2009-2010 (16) 2011-2013 (21) 2014-2015 (17) 2016-2018 (22) 2019-2021 (19) 2022-2023 (17) 2024 (4)
Publication types (Num. hits)
article(73) incollection(1) inproceedings(60)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 44 occurrences of 20 keywords

Results
Found 134 publication records. Showing 134 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
154Michal Hojsík, Bohuslav Rudolf Differential Fault Analysis of Trivium. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trivium stream cipher, fault injection, differential fault analysis
111Michal Hojsík, Bohuslav Rudolf Floating Fault Analysis of Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher, Trivium, differential fault analysis
107Alexander Maximov, Alex Biryukov Two Trivial Attacks on Trivium. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
90Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
89Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
68Tobias Eibach, Enrico Pilz, Gunnar Völkel Attacking Bivium Using SAT Solvers. Search on Bibsonomy SAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rsat, Bivium, Gröbner Base, Cryptography, Application, Stream Cipher, BDD, SAT Solver, eSTREAM, Trivium
68Simon Fischer 0002, Shahram Khazaei, Willi Meier Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain
68Simon Fischer 0002, Willi Meier Algebraic Immunity of S-Boxes and Augmented Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Augmented Function, Stream Cipher, Algebraic Attack, S-box, Trivium, Filter Generator
68Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
65Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Dirk Stegemann Extended BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain
45Mehreen Afzal, Ashraf Masood Algebraic analysis of Trivium and Trivium/128. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Julia Borghoff, Lars R. Knudsen, Mathias Stolpe Bivium as a Mixed-Integer Linear Programming Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Zhe Gao, Jun-e Feng Nonsingularity of Trivium-like cascade FSRs over finite fields via semi-tensor product. Search on Bibsonomy Int. J. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Hongyu Wang, Qunxiong Zheng, Wenfeng Qi 0001 A Fibonacci View on the Galois NFSR Used in Trivium. Search on Bibsonomy J. Syst. Sci. Complex. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Jiahui He, Kai Hu 0001, Hao Lei, Meiqin Wang Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
22Jiahui He, Kai Hu 0001, Hao Lei, Meiqin Wang Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Yousef Alghamdi, Arslan Munir An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Chen Liu, Tian Tian 0004, Wenfeng Qi 0001 A New Method for Searching Cubes and Its Application to 815-Round Trivium. Search on Bibsonomy J. Syst. Sci. Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Hao Lei, Jiahui He, Kai Hu 0001, Meiqin Wang More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi 0001, François-Xavier Standaert Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart Trivial Transciphering With Trivium and TFHE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Hao Lei, Jiahui He, Kai Hu 0001, Meiqin Wang More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities. Search on Bibsonomy SAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Junjie Cheng, Kexin Qiao Improved Graph-Based Model for Recovering Superpoly on Trivium. Search on Bibsonomy CT-RSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart Trivial Transciphering With Trivium and TFHE. Search on Bibsonomy WAHC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Anita John, Sai Kallupalle Mineesh Reddy, Jimmy Jose Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata. Search on Bibsonomy J. Cell. Autom. The full citation details ... 2022 DBLP  BibTeX  RDF
22Jianhua Wang, Baofeng Wu, Zhuojun Liu Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
22Cheng Che, Tian Tian 0004 An Experimentally Verified Attack on 820-Round Trivium (Full Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Rangana De Silva, Iranga Navaratna, Malitha Kumarasiri, Chuah Chai Wen, Janaka Alawatugoda 0001 Correlation power analysis attack on software implementation of TRIVIUM stream cipher. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Cheng Che, Tian Tian 0004 An Experimentally Verified Attack on 820-Round Trivium. Search on Bibsonomy Inscrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Bohan Li 0004, Hailong Zhang 0001, Dongdai Lin Higher-Order Masking Scheme for Trivium Hardware Implementation. Search on Bibsonomy Inscrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Kenneth Palma, Francesc Moll Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher. Search on Bibsonomy DCIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Francisco Eugenio Potestad-Ordóñez, Erica Tena-Sánchez, José Miguel Mora-Gutierrez, Manuel Valencia-Barrero, Carlos Jesús Jiménez-Fernández Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004, Fan-Yang Zeng The MILP-aided conditional differential attack and its application to Trivium. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
22Yao Sun 0004 Cube Attack against 843-Round Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
22Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme A Simpler Model for Recovering Superpoly on Trivium. Search on Bibsonomy SAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004 A Practical Key-Recovery Attack on 805-Round Trivium. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Bohan Li 0004, Meicheng Liu, Dongdai Lin FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Kalle Ngo, Elena Dubrova, Michail Moraitis Bitstream Modification of Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004, Fan-Yang Zeng The MILP-Aided Conditional Differential Attack and Its Application to Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004 A Practical Key-Recovery Attack on 805-Round Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Francisco Eugenio Potestad-Ordóñez, Manuel Valencia-Barrero, Carmen Baena Oliva, Pilar Parra Fernández, Carlos Jesús Jiménez-Fernández Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22José Miguel Mora-Gutierrez, Carlos Jesús Jiménez-Fernández, Manuel Valencia-Barrero ASIC Design and Power Characterization of Standard and Low Power Multi-Radix Trivium. Search on Bibsonomy IEEE Trans. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang 0001 Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Kalle Ngo, Elena Dubrova, Michail Moraitis Attacking Trivium at the Bitstream Level. Search on Bibsonomy ICCD The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Javier Teira Lafuente, Ana Belén Gil González, Ana de Luis-Reboredo From Trivium to Smart Education. Search on Bibsonomy ICEUTE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Anita John, B. C. Nandu, Athul Ajesh, Jimmy Jose PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Lin Jiao, Yonglin Hao, Yongqiang Li 0001 Improved guess-and-determine attack on TRIVIUM. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Latoya Jackson, Yesem Kurt Peker Quadrivium: A Trivium-Inspired Pseudorandom Number Generator. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2019 DBLP  BibTeX  RDF
22Shiyong Zhang, Gongliang Chen New results on the state cycles of Trivium. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Ximing Fu, Xiaoyun Wang 0001, Xiaoyang Dong, Willi Meier A Key-recovery Attack on 855-round Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang 0001 Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Ximing Fu, Xiaoyun Wang 0001, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004 A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Maxime Montoya, Thomas Hiscock, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier Energy-efficient Masking of the Trivium Stream Cipher. Search on Bibsonomy ICECS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Xiaojuan Zhang 0003, Meicheng Liu, Dongdai Lin Conditional Cube Searching and Applications on Trivium-Variant Ciphers. Search on Bibsonomy ISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Chen-Dong Ye, Tian Tian 0004 A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Ximing Fu, Xiaoyun Wang 0001, Xiaoyang Dong, Willi Meier A Key-Recovery Attack on 855-round Trivium. Search on Bibsonomy CRYPTO (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Francisco Eugenio Potestad-Ordóñez, Carlos Jesús Jiménez-Fernández, Carmen Baena Oliva, Pilar Parra Fernández, Manuel Valencia-Barrero Floorplanning as a practical countermeasure against clock fault attack in Trivium stream cipher. Search on Bibsonomy DCIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Asif Raza Kazmi, Mehreen Afzal, Muhammad Faisal Amjad, Haider Abbas, Xiaodong Yang 0004 Algebraic Side Channel Attack on Trivium and Grain Ciphers. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Francisco Eugenio Potestad-Ordóñez, Carlos Jesús Jiménez-Fernández, Manuel Valencia-Barrero Vulnerability Analysis of Trivium FPGA Implementations. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22José Miguel Mora-Gutierrez, Carlos Jesús Jiménez-Fernández, Manuel Valencia-Barrero Multiradix Trivium Implementations for Low-Power IoT Hardware. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Patrick Blackburn The New Trivium. Search on Bibsonomy FLAP The full citation details ... 2017 DBLP  BibTeX  RDF
22Johann A. Makowsky, Anna Zamansky Keeping logic in the trivium of computer science: a teaching perspective. Search on Bibsonomy Formal Methods Syst. Des. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Santanu Sarkar 0001, Subhamoy Maitra, Anubhab Baksi Observing biases in the state: case studies with Trivium and Trivia-SC. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22José Miguel Mora-Gutierrez, Carlos Jesús Jiménez-Fernández, Manuel Valencia-Barrero Trivium hardware implementations for power reduction. Search on Bibsonomy Int. J. Circuit Theory Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Shiyong Zhang, Gongliang Chen Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Matthias Krause 0001 On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. Search on Bibsonomy ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen A challenge-response authentication for RFID using Enhanced-Trivium. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Francisco Eugenio Potestad-Ordóñez, Carlos Jesús Jiménez-Fernández, Manuel Valencia-Barrero Fault attack on FPGA implementations of Trivium stream cipher. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Daisuke Oku, Masao Yanagisawa, Nozomu Togawa Implementation evaluation of scan-based attack against a Trivium cipher circuit. Search on Bibsonomy APCCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Pierre-Alain Fouque, Thomas Vannet Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar 0001 New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Frank-M. Quedenfeld, Christopher Wolf Advanced Algebraic Attack on Trivium. Search on Bibsonomy MACIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Dillibabu Shanmugam, Suganya Annadurai Secure Implementation of Stream Cipher: Trivium. Search on Bibsonomy SECITC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Meicheng Liu, Dongdai Lin, Wenhao Wang 0001 Searching cubes for testing Boolean functions and its application to Trivium. Search on Bibsonomy ISIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Erica Tena-Sánchez, Antonio J. Acosta 0001 DPA vulnerability analysis on Trivium stream cipher using an optimized power model. Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Zhou Chuang Wang, Zi Bin Dai High-speed realization of trivium based on multi-core cryptographic processor. Search on Bibsonomy ASICON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Akash Gupta, Surya Prakesh Mishra, Brij Mohan Suri Differential Power Attack on Trivium Implemented on FPGA. Search on Bibsonomy SocProS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa Scan-Based Attack against Trivium Stream Cipher Using Scan Signatures. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Frank-M. Quedenfeld, Christopher Wolf Advanced Algebraic Attack on Trivium. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
22Subhabrata Samajder, Palash Sarkar 0001 Some Randomness Experiments on TRIVIUM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
22Subhabrata Samajder, Palash Sarkar 0001 Some Randomness Experiments on TRIVIUM. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson Algebraic analysis of Trivium-like ciphers (Poster). Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
22Mohamed Saied Emam Mohamed, Johannes Buchmann 0001 Mutant Differential Fault Analysis of Trivium MDFA. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Avijit Dutta, Goutam Paul 0001 Deterministic Hard Fault Attack on Trivium. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Prakash Dey, Avishek Adhikari Improved Multi-Bit Differential Fault Analysis of Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Jimmy Jose, Sourav Das, Dipanwita Roy Chowdhury Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher. Search on Bibsonomy ACRI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri Superpoly algebraic normal form monomial test on Trivium. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Yupu Hu, Fengrong Zhang, Wenzheng Zhang Hard fault analysis of Trivium. Search on Bibsonomy Inf. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Paris Kitsos, Nicolas Sklavos 0001, George Provelengios, Athanassios N. Skodras FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Wen Zeng, Wenfeng Qi 0001 Finding slid pairs in trivium with MiniSat. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson Algebraic analysis of Trivium-like ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
22Pierre-Alain Fouque, Thomas Vannet Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa Scan-based attack against Trivium stream cipher independent of scan structure. Search on Bibsonomy ASICON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Piotr Mroczkowski, Janusz Szmidt The Cube Attack on Stream Cipher Trivium and Quadraticity Tests. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 134 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license