Generalized Inversion Attack on Nonlinear Filter Generators
IEEE Transactions on Computers
Inversion Attack and Branching
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Modes of Operation of Stream Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the A5/1 GSM Stream Cipher
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Cryptanalysis of the Nonlinear FeedForward Generator
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Cryptanalysis of Achterbahn-version 1 and -version 2
Journal of Computer Science and Technology
On Effectiveness of Clock Control in Stream Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Cube Attacks on Tweakable Black Box Polynomials
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison
IEEE Transactions on Information Theory
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Attacking the filter generator by finding zero inputs of the filtering function
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Revisiting correlation-immunity in filter generators
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Performance evaluation of highly efficient techniques for software implementation of LFSR
Computers and Electrical Engineering
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Two attacks against the HBB stream cipher
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
On exact algebraic [non-]immunity of s-boxes based on power functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An automatic, time-based, secure pairing protocol for passive RFID
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Index tables of finite fields and modular golomb rulers
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Algebraic immunity of S-boxes and augmented functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
CAR30: A new scalable stream cipher with rule 30
Cryptography and Communications
Cryptanalytic attacks on MIFARE classic protocol
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.07 |