<--- Back to Details
First PageDocument Content
Stream ciphers / Correlation attack / Linear feedback shift register / Polynomials / Feedback with Carry Shift Registers / Summation generator / Algebraic equation / Cryptography / Pseudorandom number generators / Mathematics
Date: 2003-11-06 19:36:50
Stream ciphers
Correlation attack
Linear feedback shift register
Polynomials
Feedback with Carry Shift Registers
Summation generator
Algebraic equation
Cryptography
Pseudorandom number generators
Mathematics

Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon National Security Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea {dlee,jaeheon,jinhon

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 193,82 KB

Share Document on Facebook

Similar Documents

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

DocID: 1xTNL - View Document

Stream ciphers  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

Stream ciphers Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

DocID: 1v6Fk - View Document

Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

DocID: 1v0Wv - View Document

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

DocID: 1uFXE - View Document