Trivium

Results: 74



#Item
41Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
42ISSUE NUMBER TWO, 2014  TISPOL NEWS TRIVIUM 2: partnership working brings excellent results in recent operation

ISSUE NUMBER TWO, 2014 TISPOL NEWS TRIVIUM 2: partnership working brings excellent results in recent operation

Add to Reading List

Source URL: www.tispol.org

Language: English - Date: 2014-07-27 17:41:36
43ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
44ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-10-16 12:45:18
45Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 FHNW  and 2 EPFL (Switzerland)

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 FHNW and 2 EPFL (Switzerland)

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-02-08 09:09:58
46Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
47Hardware performance of eStream phase-III stream cipher candidates T. Good and M. Benaissa Department of Electrical & Electronic Engineering, University of Sheffield, Mappin Street, Sheffield, S1 3JD, UK {t.good, m.benai

Hardware performance of eStream phase-III stream cipher candidates T. Good and M. Benaissa Department of Electrical & Electronic Engineering, University of Sheffield, Mappin Street, Sheffield, S1 3JD, UK {t.good, m.benai

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-03-21 12:27:04
48

PDF Document

Add to Reading List

Source URL: www.kcssonline.org

Language: English - Date: 2014-05-02 13:29:18
49Trivium Pursuit 2008 Catalog copy.indd

Trivium Pursuit 2008 Catalog copy.indd

Add to Reading List

Source URL: www.triviumpursuit.com

Language: English - Date: 2008-10-20 17:17:40
50ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-01-19 12:15:12