<--- Back to Details
First PageDocument Content
Cryptography / Stream ciphers / Linear-feedback shift register / Correlation attack / Grain / Self-shrinking generator / QUAD / Py / ESTREAM
Date: 2006-03-23 04:05:33
Cryptography
Stream ciphers
Linear-feedback shift register
Correlation attack
Grain
Self-shrinking generator
QUAD
Py
ESTREAM

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.rocq.inria.fr

Download Document from Source Website

File Size: 116,11 KB

Share Document on Facebook

Similar Documents

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

DocID: 1xTNL - View Document

Stream ciphers  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

Stream ciphers Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

DocID: 1v6Fk - View Document

Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

DocID: 1v0Wv - View Document

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

DocID: 1uFXE - View Document