A New Class of Single Cycle T-Functions
暂无分享,去创建一个
Dong Hoon Lee | Jin Hong | Daewan Han | Yongjin Yeom | Yongjin Yeom | Jin Hong | Daewan Han | Dong Hoon Lee
[1] Adi Shamir,et al. Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.
[2] Thomas Johansson,et al. A New Version of the Stream Cipher SNOW , 2002, Selected Areas in Cryptography.
[3] William Millan,et al. The LILI-II Keystream Generator , 2002, ACISP.
[4] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[5] Reihaneh Safavi-Naini,et al. Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings , 2006, ACISP.
[6] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[7] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[8] Adi Shamir. Stream Ciphers: Dead or Alive? , 2004, ASIACRYPT.
[9] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[10] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.
[11] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[12] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[13] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[14] Adi Shamir,et al. A New Class of Invertible Mappings , 2002, CHES.
[15] William Millan,et al. Dragon: A Fast Word Based Stream Cipher , 2004, ICISC.
[16] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[17] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[18] V. S. Anachin. Uniformly distributed sequences ofp-adic integers , 1994 .
[19] Shai Halevi,et al. Scream: A Software-Efficient Stream Cipher , 2002, FSE.
[20] Adi Shamir,et al. New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.
[21] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[22] Dong Hoon Lee,et al. Algebraic Attacks on Summation Generators , 2004, FSE.
[23] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[24] Choonsik Park,et al. Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.
[25] Frederik Armknecht,et al. Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.
[26] Pil Joong Lee,et al. Advances in Cryptology — ASIACRYPT 2001 , 2001, Lecture Notes in Computer Science.
[27] Palash Sarkar,et al. Time-Memory Trade-Off Attacks on Multiplications and T-Functions , 2004, ASIACRYPT.
[28] Bruce Schneier,et al. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.
[29] Martin Boesgaard,et al. Rabbit: A New High-Performance Stream Cipher , 2003, FSE.
[30] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[31] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[32] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[33] Bart Preneel,et al. A New Keystream Generator MUGI , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[34] Hongjun Wu. A New Stream Cipher HC-256 , 2004, FSE.