The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase stream cipher (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1990 (17) 1991-1997 (15) 1998-1999 (15) 2000 (17) 2001 (21) 2002 (24) 2003 (27) 2004 (36) 2005 (40) 2006 (56) 2007 (73) 2008 (82) 2009 (54) 2010 (24) 2011 (40) 2012 (28) 2013 (39) 2014 (30) 2015 (24) 2016 (24) 2017 (27) 2018 (28) 2019 (7)
Publication types (Num. hits)
article(221) book(1) incollection(28) inproceedings(497) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 770 occurrences of 239 keywords

Results
Found 748 publication records. Showing 748 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, random walks, expander graph
89Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher
88Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
87Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF jump register, stream cipher, Pomaranch
85Ed Dawson, Matthew Henricksen, Leonie Simpson The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
81Côme Berbain, Henri Gilbert On the Security of IV Dependent Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IV setup, stream cipher, provable security, PRNG
81Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis
80Bin Zhang 0003, Hongjun Wu, Dengguo Feng, Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer
79Yang Xiao, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
76Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
75Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
75Danilo Gligoroski, Smile Markovski, Svein J. Knapskog The Stream Cipher Edon80. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square
74Christophe De Cannière Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
72Palash Sarkar 0001 Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stream cipher, cellular automata, self-synchronization
71Martin Boesgaard, Mette Vesterager, Erik Zenner The Rabbit Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stream cipher, coupled, non-linear, counter, fast
70Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
70Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha Security of Jump Controlled Sequence Generators for Stream Ciphers. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch
68Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee 0001, Sang-Jae Moon Dragon: A Fast Word Based Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF word based stream cipher, nonlinear filter, nonlinear feedback shift register
67Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
67Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan Bio-chaotic Stream Cipher-Based Iris Image Encryption. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
66Paul Crowley, Stefan Lucks Bias in the LEVIATHAN Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
65Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
65Antoine Joux, Jean-René Reinhard Overtaking VEST. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inner collision, chosen IV attack, Stream cipher
64Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Camel Tanougast, Serge Weber, Gilles Millerioux, Jamal Daafouz, Ahmed Bouridane VLSI Architecture and FPGA Implementation of a Hybrid Message-Embedded Self-Synchronizing Stream Cipher. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography system, self-synchronising stream cipher, FPGA, VLSI design
64Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
64Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li Research on a Novel Hashing Stream Cipher. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Information security, Hash function
64Hoon-Jae Lee 0001 Highly Reliable Synchronous Stream Cipher System for Link Encryption. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF synchronization, stream cipher, randomness, Keystream
64Matthew Henricksen, Ed Dawson Rekeying Issues in the MUGI Stream Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MUGI, MUGI-M, key initialization, key agility, stream cipher
64Bartosz Zoltak VMPC One-Way Function and Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF lower bound, cryptanalysis, stream cipher, one-way function, RC4
64Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, Ove Scavenius Rabbit: A New High-Performance Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Stream cipher, coupled, chaos, non-linear, counter, fast
63Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Nicolas Courtois, Sean O'Neil, Jean-Jacques Quisquater Practical Algebraic Attacks on the Hitag2 Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis
62Christophe De Cannière, Bart Preneel Trivium. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Shai Halevi, Don Coppersmith, Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Round functions, Stream ciphers, Block ciphers, SEAL
57Côme Berbain, Henri Gilbert, Alexander Maximov Cryptanalysis of Grain. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Correlation attack, Walsh transform
57Hongjun Wu, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
57Kishan Chand Gupta, Subhamoy Maitra Primitive Polynomials over GF(2) - A Cryptologic Approach. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cyclotomic Cosets, Stream Cipher, Galois field, Primitive Polynomials
57Alex Biryukov Design of a New Stream Cipher-LEX. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
55Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi Cryptanalysis of MV3 Stream Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack
55Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Decimv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita CryptMT3 Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
53Thomas Pornin, Jacques Stern Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off
52Nicolas Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
52Leonie Simpson, Matthew Henricksen, Wun-She Yap Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Common Scrambling Algorithm, Cryptanalysis, Stream Cipher, Digital Video Broadcasting
52Haina Zhang, Lin Li, Xiaoyun Wang Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
52Paris Kitsos, Odysseas G. Koufopavlou An FPGA-based implementation of the Pomaranch stream cipher. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF eStream project, FPGA, stream cipher, hardware implementation, Pomaranch
52Haina Zhang, Xiaoyun Wang Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis
52Hongjun Wu, Bart Preneel Cryptanalysis of the Stream Cipher ABC v2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-dependent S-box, ABC v2, stream cipher, Fast correlation attack
51Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stream Cipher Mode
51Daniel J. Bernstein The Salsa20 Family of Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50HongGeun Kim, Jungkyu Han, Seongje Cho An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RC4 implementation, stream cipher, contents protection
50Donald W. Davies, Graeme I. P. Parkin The average Cycle size of the Key-Stream in Output Feedback Encipherment. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
50Matthias Krause 0001, Dirk Stegemann Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator
50Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, diversity, period, counter, degeneracy, Rabbit
50Bin Zhang 0003, Hongjun Wu, Dengguo Feng, Feng Bao 0001 Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 2-adic expansion, Stream cipher, Self-synchronizing, Feedback shift register
50Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
50Hongjun Wu The Stream Cipher HC-128. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Matthew Henricksen, Ed Dawson Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4
48Richard Taylor 0002 An Integrity Check Value Algorithm for Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
47Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries Specification for NLSv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Chih-Hsu Yen, Yu-Shiang Lin, Bing-Fei Wu An efficient implementation of a low-complexity MP3 algorithm with a stream cipher. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DSP, DRM, MP3, Multimedia security, Low complexity
46Bin Zhang 0015, Chenhui Jin Cryptanalysis of a Chaos-based Stream Cipher. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
45Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan Word Oriented Cascade Jump sigma-LFSR. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cascade Jump LFSR, ??LFSR, Fast Software Encryption, Stream Cipher, Linear Feedback Shift Register(LFSR)
45Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
45Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack
45Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
45Fang-Wei Fu, Harald Niederreiter, Ming Su The Characterization of 2n-Periodic Binary Sequences with Fixed 1-Error Linear Complexity. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher systems, Counting function, Fast algorithms, Linear complexity, Periodic sequences, k-Error linear complexity
45Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Salsa20, TSC-4, Chosen IV Attack, Stream Cipher, eSTREAM
45Kaisa Nyberg, Johan Wallén Improved Linear Distinguishers for SNOW 2.0. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SNOW 2.0, linear masking method, Stream cipher, modular addition
45Dai Watanabe, Soichi Furuya A MAC Forgery Attack on SOBER-128. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER, Stream cipher, Differential cryptanalysis, Message Authentication Code
45Jin Hong 0001, Dong Hoon Lee 0002, Seongtaek Chee, Palash Sarkar 0001 Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF nonlinear filter model, Anderson information leakage, Stream cipher, LFSR, CA
45Håvard Molland, Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack
45Dai Watanabe, Alex Biryukov, Christophe De Cannière A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Stream cipher, Linear cryptanalysis, SNOW
45Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, Stream cipher, encryption, MAC
45Bimal K. Roy A Brief Outline of Research on Correlation Immune Functions. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Boolean Function, Stream Cipher, Symmetry, Nonlinearity, Enumeration, Autocorrelation, Balancedness, Correlation Immunity, Algebraic Degree, Multiple Output Function
45Sandeepan Chowdhury, Subhamoy Maitra Efficient Software Implementation of Linear Feedback Shift Registers. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Oriented LFSR, Connection Polynomials, Stream Cipher
45Dingyi Pei, Wenliang Qin The Correlation of a Boolean Function with Its Variables. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Boolean function, stream cipher, correlation, Walsh transformation
45Darshana Upadhyay, Trishla Shah, Priyanka Sharma Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher. Search on Bibsonomy VDAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
44Alex Biryukov, Adi Shamir Analysis of the Non-linear Part of Mugi. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mugi, Cryptanalysis, Stream ciphers
44Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
43Palash Sarkar 0001, Subhamoy Maitra Efficient Implementation of "Large" Stream Cipher Systems. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Boolean functions, Stream Ciphers, Cellular Automata, Linear Feedback Shift Registers, Reconfigurable Hardware, Pipelined Architecture
43John O. Pliam A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
43Martin Hell, Thomas Johansson 0001 Breaking the F-FCSR-H Stream Cipher in Real Time. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Tim Good, Mohammed Benaissa ASIC Hardware Performance. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann Operating System Integration and Performance of a Multi Stream Cipher Architecture for Reconfigurable System-on-Chip. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Berndt M. Gammel, Rainer Göttfert, O. Kniffler An NLFSR-based stream cipher. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Matthieu Finiasz, Serge Vaudenay When Stream Cipher Analysis Meets Public-Key Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Hong-Sain Ooi High-Speed Stream Cipher. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Frédéric Muller Differential Attacks against the Helix Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Patrik Ekdahl, Thomas Johansson 0001 A New Version of the Stream Cipher SNOW. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF summation combiner, Stream ciphers, correlation attacks, SNOW
Displaying result #1 - #100 of 748 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license