×

Found 65 Documents (Results 1–65)

Flaws in the initialisation process of stream ciphers. (English) Zbl 1382.94043

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 19-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CASca: a CA based scalable stream cipher. (English) Zbl 1327.94047

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 95-105 (2015).
MSC:  94A60 68Q80
PDFBibTeX XMLCite
Full Text: DOI

On the key-stream periods probability of Edon80. (English) Zbl 1347.94063

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 55-69 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

One word/cycle HC-128 accelerator via state-splitting optimization. (English) Zbl 1337.94041

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 283-303 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

MaD2: an ultra-performance stream cipher for pervasive data encryption. (English) Zbl 1317.94121

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 1-17 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New speed records for Salsa20 stream cipher using an autotuning framework on GPUs. (English) Zbl 1312.94063

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 189-207 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimized GPU implementation and performance analysis of HC series of stream ciphers. (English) Zbl 1342.94074

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 293-308 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

An improved hardware implementation of the grain-128a stream cipher. (English) Zbl 1342.94083

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 278-292 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

PRINCE – a low-latency block cipher for pervasive computing applications. Extended abstract. (English) Zbl 1292.94035

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 208-225 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault analysis of Sosemanuk. (English) Zbl 1280.94049

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 316-331 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault analysis of grain-128 by targeting NFSR. (English) Zbl 1280.94074

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 298-315 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacking Bivium and Trivium with the characteristic set method. (English) Zbl 1280.94070

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 77-91 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Loiss: a byte-oriented stream cipher. (English) Zbl 1272.94029

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 109-125 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags. (English) Zbl 1290.94120

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 114-129 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A low-area yet performant FPGA implementation of Shabal. (English) Zbl 1290.94062

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 99-113 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hill climbing algorithms and Trivium. (English) Zbl 1290.94046

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 57-73 (2011).
MSC:  94A60 90C90
PDFBibTeX XMLCite
Full Text: DOI

Greedy distinguishers and nonrandomness detectors. (English) Zbl 1294.94078

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 210-226 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

\(d\)-monomial tests of nonlinear cellular automata for cryptographic design. (English) Zbl 1307.94062

Bandini, Stefania (ed.) et al., Cellular automata. 9th international conference on cellular automata for research and industry, ACRI 2010, Ascoli Piceno, Italy, September 21–24, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15978-7/pbk). Lecture Notes in Computer Science 6350, 261-270 (2010).
MSC:  94A60 68Q80
PDFBibTeX XMLCite
Full Text: DOI

Algebraic and correlation attacks against linearly filtered non linear feedback shift registers. (English) Zbl 1256.94043

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 184-198 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks on tweakable black box polynomials. (English) Zbl 1239.94045

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 278-299 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking the F-FCSR-H stream cipher in real time. (English) Zbl 1206.94071

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 557-569 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chai-Tea, cryptographic hardware implementations of xTEA. (English) Zbl 1203.94105

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 363-375 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New AES software speed records. (English) Zbl 1203.94093

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 322-336 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Floating fault analysis of Trivium. (English) Zbl 1203.94103

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 239-250 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Scan based side channel attacks on stream ciphers and their counter-measures. (English) Zbl 1203.94088

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 226-238 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of RC4 and proposal of additional layers for better security margin. (English) Zbl 1203.94115

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 27-39 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New directions in cryptanalysis of self-synchronizing stream ciphers. (English) Zbl 1203.94107

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 15-26 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Slid pairs in Salsa20 and Trivium. (English) Zbl 1203.94119

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 1-14 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacking Bivium using SAT solvers. (English) Zbl 1138.68536

Kleine Büning, Hans (ed.) et al., Theory and applications of satisfiability testing – SAT 2008. 11th international conference, SAT 2008, Guangzhou, China, May 12–15, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79718-0/pbk). Lecture Notes in Computer Science 4996, 63-76 (2008).
MSC:  68T20 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. (English) Zbl 1140.94320

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 147-164 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to strengthen pseudo-random generators by using compression. (English) Zbl 1140.94341

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 129-146 (2006).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

QUAD: A practical stream cipher with provable security. (English) Zbl 1140.94322

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 109-128 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software