Improved Cryptanalysis of the Self-Shrinking Generator
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Strategic attack on the shrinking generator
Theoretical Computer Science
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Random Fault Attack against Shrinking Generator
Algorithmic Aspects of Wireless Sensor Networks
A simple attack on some clock-controlled generators
Computers & Mathematics with Applications
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Fault cryptanalysis and the shrinking generator
WEA'06 Proceedings of the 5th international conference on Experimental Algorithms
Some attacks on the bit-search generator
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A fast correlation attack on the shrinking generator
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Distinguishing stream ciphers with convolutional filters
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Practical attack on the shrinking generator
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
New variant of the self-shrinking generator and its cryptographic properties
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.00 |