<--- Back to Details
First PageDocument Content
Cryptography / Stream ciphers / Linear-feedback shift register / Correlation attack / Grain / Self-shrinking generator / QUAD / Py / ESTREAM
Date: 2006-03-23 04:05:33
Cryptography
Stream ciphers
Linear-feedback shift register
Correlation attack
Grain
Self-shrinking generator
QUAD
Py
ESTREAM

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.rocq.inria.fr

Download Document from Source Website

File Size: 116,11 KB

Share Document on Facebook

Similar Documents

Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

DocID: 1qpK0 - View Document

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

DocID: 1lKXx - View Document

DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DocID: 1lmmk - View Document

DECIMv2  ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

DocID: 1anni - View Document

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

DocID: NlGT - View Document