A heuristic approach towards variability of HC-128
暂无分享,去创建一个
[1] Goutam Paul,et al. A Combinatorial Analysis of HC-128 , 2010, IACR Cryptol. ePrint Arch..
[2] Yunyi Liu,et al. The Key and IV Setup of the Stream Ciphers HC-256 and HC-128 , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[3] Amr M. Youssef,et al. Differential Fault Analysis of HC-128 , 2010, AFRICACRYPT.
[4] Martin Hell,et al. An overview of distinguishing attacks on stream ciphers , 2009, Cryptography and Communications.
[5] Willi Meier,et al. Cryptographic Significance of the Carry for Ciphers Based on Integer Addition , 1990, CRYPTO.
[6] Santanu Sarkar,et al. Differential Fault Attack on Grain v1, ACORN v3 and Lizard , 2017, IACR Cryptol. ePrint Arch..
[7] Hongjun Wu,et al. The Stream Cipher HC-128 , 2008, The eSTREAM Finalists.
[8] Martin Hell,et al. Improved distinguishers for HC-128 , 2012, Des. Codes Cryptogr..
[9] Hongjun Wu. A New Stream Cipher HC-256 , 2004, FSE.
[10] Mohammad Eftekhari,et al. Cryptanalysis and improvements on some graph-based authentication schemes , 2012, ArXiv.
[11] Subhamoy Maitra,et al. Some observations on HC-128 , 2011, Des. Codes Cryptogr..