1![ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004 ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004](https://www.pdfsearch.io/img/f4f80d6f8661d8211c138eae6c1710c6.jpg) | Add to Reading ListSource URL: srtp.sourceforge.netLanguage: English - Date: 2004-08-16 14:34:48
|
---|
2![Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology](https://www.pdfsearch.io/img/131873e10b08b0e5f94ce67f1d8ff3de.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-05-09 09:25:02
|
---|
3![############################################################## Block Cipher Modes of Operation Output FeedBack (OFB) IV is[removed][removed]08090A0B 0C0D0E0F ############################################################## Block Cipher Modes of Operation Output FeedBack (OFB) IV is[removed][removed]08090A0B 0C0D0E0F](https://www.pdfsearch.io/img/17404c4f161a6d25855f104540e344af.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-08-08 12:32:18
|
---|
4![############################################################## Block Cipher Modes of Operation Output Feedback (OFB) ############################################################## OFB-TDES (Encryption) ############################################################## Block Cipher Modes of Operation Output Feedback (OFB) ############################################################## OFB-TDES (Encryption)](https://www.pdfsearch.io/img/525a13a428cbea01f6de52bafb0b59f0.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-08-08 13:46:16
|
---|
5![Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000 Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000](https://www.pdfsearch.io/img/eb15ffde53353d2a00b80042c05247b3.jpg) | Add to Reading ListSource URL: www.mindspring.comLanguage: English - Date: 2000-10-19 13:37:14
|
---|
6![Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3 Distinguishing Attacks on T-functions Simon K¨ unzli1,2 Pascal Junod3](https://www.pdfsearch.io/img/bdc0050b6c8875b491c9a0d6d570dfbd.jpg) | Add to Reading ListSource URL: www.simonfischer.chLanguage: English - Date: 2007-05-21 09:22:00
|
---|
7![Comments on \Theory and Applications of Cellular Automata in Cryptography Comments on \Theory and Applications of Cellular Automata in Cryptography](https://www.pdfsearch.io/img/aa52822f15387589b8d9332ab74d4427.jpg) | Add to Reading ListSource URL: www.isg.rhul.ac.ukLanguage: English - Date: 2005-11-30 04:39:58
|
---|
8![University of Salzburg, February 2, 2007 Design and Recent Analysis of eSTREAM Candidates Willi Meier University of Salzburg, February 2, 2007 Design and Recent Analysis of eSTREAM Candidates Willi Meier](https://www.pdfsearch.io/img/a390bbc98b2dbe2a2bba3ada76139c80.jpg) | Add to Reading ListSource URL: random.mat.sbg.ac.atLanguage: English - Date: 2010-06-09 05:16:35
|
---|
9![On the Security of IV Dependent Stream Ciphers On the Security of IV Dependent Stream Ciphers](https://www.pdfsearch.io/img/1beb7a014e3ad8b1f4bb90004e114c5b.jpg) | Add to Reading ListSource URL: crypto.rd.francetelecom.comLanguage: English - Date: 2009-09-02 11:51:02
|
---|
10![On the Security of IV Dependent Stream Ciphers On the Security of IV Dependent Stream Ciphers](https://www.pdfsearch.io/img/d6d631cc3976f6dd8545730c5abe91a2.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2009-07-29 02:04:49
|
---|