Correlation properties of combiners with memory in stream ciphers (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Parallel stream cipher for secure high-speed communications
Signal Processing
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Known Plaintext Attack of FEAL-4 and FEAL-6
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Security of the Gollmann Cascades
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Linear Cryptanalysis of Bluetooth Stream Cipher
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
An algebraic attack on the improved summation generator with 2-bit memory
Information Processing Letters
Design and Properties of a New Pseudorandom Generator Based on a Filtered FCSR Automaton
IEEE Transactions on Computers
An algebraic attack on the improved summation generator with 2-bit memory
Information Processing Letters
Fast low order approximation of cryptographic functions
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
The ANF of the composition of addition and multiplication mod 2n
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
The conditional correlation attack: a practical attack on bluetooth encryption
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A survey of feedback with carry shift registers
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |