Energy, performance, area versus security trade-offs for stream ciphers
暂无分享,去创建一个
[1] M. Hamid,et al. A note to low-power linear feedback shift registers , 1998 .
[2] Franco Fummi,et al. Power characterization of LFSRs , 1999, Proceedings 1999 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (EFT'99).
[3] O. Koufopavlou,et al. Hardware implementation of the RC4 stream cipher , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[4] Adi Shamir,et al. Guaranteeing the Diversity of Number Generators , 2001, Inf. Comput..
[5] Odysseas G. Koufopavlou,et al. Hardware Implementation of Bluetooth Security , 2003, IEEE Pervasive Comput..
[6] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[7] Vincent Rijmen,et al. Recent Developments in the Design of Conventional Cryptographic Algorithms , 1997, State of the Art in Applied Cryptography.
[8] Frederik Armknecht,et al. Extending the Resynchronization Attack (extended version) , 2004 .
[9] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[10] Adi Shamir,et al. New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.
[11] Paris Kitsos,et al. A reconfigurable linear feedback shift register (LFSR) for the Bluetooth system , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).
[12] Joos Vandewalle,et al. Resynchronization Weaknesses in Synchronous Stream Ciphers , 1994, EUROCRYPT.