Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Analysis of the E0 Encryption System
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
On Effectiveness of Clock Control in Stream Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Optimal correlation attack on the multiplexer generator
Information Processing Letters
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
On the efficiency of the clock control guessing attack
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Reduced complexity attacks on the alternating step generator
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Extending the resynchronization attack
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Statistical Weakness of Multiplexed Sequences
Finite Fields and Their Applications
Hi-index | 0.00 |