CAR30: A new scalable stream cipher with rule 30
暂无分享,去创建一个
[1] Parimal Pal Chaudhuri,et al. Additive Cellular Automata Theory and Applications Volume I , 1997 .
[2] T. E. Bjrstad. Cryptanalysis of Grain using Time / Memory / Data Tradeos , 2008 .
[3] T. E. Bjørstad. Cryptanalysis of Grain using Time / Memory / Data Tradeoffs , 2008 .
[4] Wieland Fischer,et al. Differential Power Analysis of Stream Ciphers , 2007, CT-RSA.
[5] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[6] Palash Sarkar. The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers , 2002, CRYPTO.
[7] Ed Dawson,et al. Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.
[8] Emmanuel Prouff,et al. DPA Attacks and S-Boxes , 2005, FSE.
[9] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[10] Matthew J. B. Robshaw,et al. The eSTREAM Project , 2008, The eSTREAM Finalists.
[11] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[12] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[13] Martin Boesgaard,et al. Rabbit: A New High-Performance Stream Cipher , 2003, FSE.
[14] Santanu Chattopadhyay,et al. Additive cellular automata : theory and applications , 1997 .
[15] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[16] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[17] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[18] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[19] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[20] Bart Preneel,et al. Analysis of Grain's Initialization Algorithm , 2008, AFRICACRYPT.
[21] Philip Hawkes,et al. Guess-and-Determine Attacks on SNOW , 2002, Selected Areas in Cryptography.
[22] Alexander Maximov. Cryptanalysis of the "Grain" family of stream ciphers , 2006, ASIACCS '06.
[23] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[24] Stéphane Badel,et al. ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware , 2010, CHES.
[25] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[26] Kris Gaj,et al. Comparison of hardware performance of selected Phase II eSTREAM candidates , 2007 .
[27] Claude Carlet,et al. On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks , 2005, INDOCRYPT.