×

Found 31 Documents (Results 1–31)

Flaws in the initialisation process of stream ciphers. (English) Zbl 1382.94043

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 19-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of full sprout. (English) Zbl 1375.94142

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 663-682 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CASca: a CA based scalable stream cipher. (English) Zbl 1327.94047

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 95-105 (2015).
MSC:  94A60 68Q80
PDFBibTeX XMLCite
Full Text: DOI

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English) Zbl 1353.94038

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An improved hardware implementation of the grain-128a stream cipher. (English) Zbl 1342.94083

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 278-292 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

NOCAS: a nonlinear cellular automata based stream cipher. (English) Zbl 1323.94120

Fatès, Nazim (ed.) et al., Automata 2011. Selected papers based on the presentations at the 17th international workshop on cellular automata and discrete complex systems, Santiago, Chile, November 21–23, 2011. Nancy: The Association. Discrete Mathematics & Theoretical Computer Science (DMTCS). Discrete Mathematics and Theoretical Computer Science. Proceedings, 135-146, electronic only (2012).
MSC:  94A60 68Q80
PDFBibTeX XMLCite
Full Text: Link

Duplexing the sponge: Single-pass authenticated encryption and other applications. (English) Zbl 1292.94030

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the stability of \(m\)-sequences. (English) Zbl 1291.94034

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 259-274 (2011).
MSC:  94A55
PDFBibTeX XMLCite
Full Text: DOI

Breaking Grain-128 with dynamic cube attacks. (English) Zbl 1282.94042

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 167-187 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault analysis of grain-128 by targeting NFSR. (English) Zbl 1280.94074

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 298-315 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. (English) Zbl 1292.94032

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 229-240 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Greedy distinguishers and nonrandomness detectors. (English) Zbl 1294.94078

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 210-226 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Algebraic and correlation attacks against linearly filtered non linear feedback shift registers. (English) Zbl 1256.94043

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 184-198 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software