Hardware Implementations of Multi-output Welch-Gong Ciphers
暂无分享,去创建一个
[1] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[2] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[3] Kris Gaj,et al. Comparison of hardware performance of selected Phase II eSTREAM candidates , 2007 .
[4] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[5] Guang Gong,et al. Theory and applications of q-ary interleaved sequences , 1995, IEEE Trans. Inf. Theory.
[6] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.
[7] John F. Dillon,et al. Multiplicative Difference Sets via Additive Characters , 1999, Des. Codes Cryptogr..
[8] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[9] Martin. Feldhofer. Comparison of Low-Power Implementations of Trivium and Grain , 2007 .
[10] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[11] Ingrid Verbauwhede,et al. Energy, performance, area versus security trade-offs for stream ciphers , 2004 .
[12] Guang Gong,et al. A Note on Low-Correlation Zone Signal Sets , 2007, IEEE Transactions on Information Theory.
[13] Hans Dobbertin,et al. New cyclic difference sets with Singer parameters , 2004, Finite Fields Their Appl..
[14] Jean-Jacques Quisquater,et al. FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile , 2007 .
[15] Tor Helleseth,et al. On Attacks on Filtering Generators Using Linear Subspace Structures , 2007, SSC.
[16] Bart Preneel,et al. Resynchronization Attacks on WG and LEX , 2006, FSE.
[17] Christine Nadel,et al. Spread Spectrum Communications Handbook , 2016 .
[18] Serge Vaudenay,et al. Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.
[19] Guang Gong,et al. Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar , 2005 .
[20] Guang Gong,et al. WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..
[21] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[22] Amr M. Youssef,et al. Cryptographic properties of the Welch-Gong transformation sequence generators , 2002, IEEE Trans. Inf. Theory.
[23] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[24] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.
[25] Berk Sunar,et al. An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.
[26] Kris Gaj,et al. Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates , 2008 .