1![Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion Motivation Our Contribution Definitions and Preliminaries Practical Security Evaluation of GF-NLFSR against DC and LC Application Conclusion](https://www.pdfsearch.io/img/b80324ad6c83dc9e7e05b1bb28c010a4.jpg) | Add to Reading ListSource URL: 2010.africacrypt.comLanguage: English - Date: 2010-05-23 22:32:12
|
---|
2![Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx Microsoft PowerPoint - Physical Attacks in a Physical World_MIT Seminar_June 2010.pptx](https://www.pdfsearch.io/img/b256358aaa229ea094915c986617bcf2.jpg) | Add to Reading ListSource URL: www.emsec.rub.deLanguage: English - Date: 2011-01-18 19:16:52
|
---|
3![A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India. A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.](https://www.pdfsearch.io/img/1543af1e1f8c10bbbdaf56c980a55a22.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-15 10:23:44
|
---|
4![Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria Comparison of Low-Power Implementations of Trivium and Grain? Martin Feldhofer Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse 16a, A–8010 Graz, Austria](https://www.pdfsearch.io/img/e3b6e4420ff25c4acc4b62cd698491be.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2007-02-22 22:32:18
|
---|
5![State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute, State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,](https://www.pdfsearch.io/img/f583c31a319183cab79958270f1b1858.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-10 00:26:26
|
---|
6![Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙](https://www.pdfsearch.io/img/7a5ca5076c72283d2ded19a9428c747a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-03-31 09:15:34
|
---|
7![Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , Elham Shakour2 and Ron Steinfeld3 1 Center for Advanced Computing, Algorithms and Cryptography, Department of Computing, Facul](https://www.pdfsearch.io/img/b2502e284565615e9042aa0be3162225.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-11-16 23:58:57
|
---|
8![On the cycle decomposition of the WG-NLFSR Li Yujuan 1† & Shen Wenhua 2 & Wang Huaifu 3 & Zhou Peipei On the cycle decomposition of the WG-NLFSR Li Yujuan 1† & Shen Wenhua 2 & Wang Huaifu 3 & Zhou Peipei](https://www.pdfsearch.io/img/c920b5b564a166c842a93c735a3c0749.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-08-23 22:48:53
|
---|
9![ECRYPT II ICT[removed]ECRYPT II European Network of Excellence in Cryptology II ECRYPT II ICT[removed]ECRYPT II European Network of Excellence in Cryptology II](https://www.pdfsearch.io/img/a7fb453b69f8ddefcdd8dc89fba11bc1.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2009-08-17 14:52:19
|
---|
10![VEST Hardware-Dedicated Stream Ciphers (eSTREAM Round 1 Submission, Revised) VEST Hardware-Dedicated Stream Ciphers (eSTREAM Round 1 Submission, Revised)](https://www.pdfsearch.io/img/ad59b03ca5e27e02dda515c6d0c75535.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2005-10-31 03:26:50
|
---|