HC-256

Results: 19



#Item
1

Motivation Introduction Fault Analysis on HC-256

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    2HC-256 / Q / Stream ciphers / Advanced Encryption Standard / Py

    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2006-02-13 07:41:31
    3SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

    ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2012-01-19 12:15:12
    4Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

    A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-04-01 09:18:30
    5Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

    A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-15 14:18:24
    6HarperCollins

    Winter/Spring 2014 Adult Dewey Diva Picks- HarperCollins Canada Astoria by Peter Stark- Ecco[removed]HC- $[removed]History- 256 pp. – March 2014 In the tradition of The Lost City of Z and Skeleton in the Zahara,

    Add to Reading List

    Source URL: files.harpercollins.com

    Language: English - Date: 2014-04-11 13:24:31
      7Salsa20 / Rabbit / Trivium / MICKEY / F-FCSR / Py / Grain / ECRYPT / HC-256 / Stream ciphers / ESTREAM / SOSEMANUK

      ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2009-10-16 12:45:18
      8Wilderness

      HC, 6 x 9, 256 pp, $[removed][removed]www.fulcrumbooks.com Michael McBride

      Add to Reading List

      Source URL: www.fulcrum-books.com

      Language: English - Date: 2013-08-15 14:27:52
        9SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

        ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2012-01-19 12:15:12
        10Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

        Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2005-06-03 08:04:08
        UPDATE