Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
暂无分享,去创建一个
[1] J G Willis. Review , 2012, Speculum.
[2] Sean O'Neil. Algebraic Structure Defectoscopy , 2007, IACR Cryptol. ePrint Arch..
[3] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[4] Jean-Jacques Quisquater,et al. FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile , 2007 .
[5] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[6] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[7] Seokhie Hong,et al. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 , 2008, ACISP.
[8] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[9] Kris Gaj,et al. Comparison of hardware performance of selected Phase II eSTREAM candidates , 2007 .
[10] Eli Biham,et al. A Fast New DES Implementation in Software , 1997, FSE.
[11] M. Benaissa,et al. Hardware performance of eStream phase-III stream cipher candidates , 2008 .
[12] Christof Paar,et al. Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker , 2006, CHES.
[13] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[14] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[15] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[16] Shahram Khazaei,et al. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.
[17] Tim Güneysu,et al. Cryptanalysis with COPACOBANA , 2008, IEEE Transactions on Computers.
[18] Bart Preneel,et al. Analysis of Grain's Initialization Algorithm , 2008, AFRICACRYPT.
[19] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[20] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..