DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» DECIM
DECIM
Key Differentiation Attacks on Stream Ciphers
Side Channel Analysis Attacks on Stream Ciphers
Decim V2
Bahles of Cryptographic Algorithms
New Cryptanalysis of Irregularly Decimated Stream Ciphers
Revisiting a Recent Resource-Efficient Technique For
Foreign Languages for the Use of Printers and Translators
Design and Implementation of a Most Secure Cryptographic Scheme for Lightweight Environment Using Elliptic Curve and Trigonohash Technique
Comparison of FPGA-Targeted Hardware Implementations of Estream Stream Cipher Candidates
DECIM: Detecting Endpoint Compromise in Messaging
LNCS 4515, Pp
The Estream Project
Analysis and Implementation of Estream and SHA-3 Cryptographic Algorithms
Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications K
Correlated Keystreams in Moustique
The Hash Function Family LAKE
Comparison of FPGA-Targeted Hardware Implementations of Estream Stream Cipher Candidates
A Novel Polyalphabetic Substitution Based Cryptosystem (NPSBC)
Top View
Decim, a New Stream Cipher for Hardware Applications ∗
Side Channel Attacks on Symmetric Key Primitives” and Submitted in Partial Fulfillment of the Requirements for the Degree Of
Randomness in Digital Cryptography
Embedded Electronic Circuits for Cryptography, Hardware Security and True Random Number Generation: an Overview
An Impact of Cryptographic Function's Blocks on The
A Simple Block Cipher with Chained Substitution G
Hardware Evaluation of Estream Candidates
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
Algebraic Attacks on Clock-Controlled Stream Ciphers
Classification of Cryptographic Libraries
Which Estream Ciphers Have Been Broken?
DECIM: Detecting Endpoint Compromise in Messaging
Cryptanalysis of Stream Cipher
4.2 Cipher Categorisation
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Efektywność Szyfrów Strumieniowych W Układach Programowalnych
Side Channel Attacks on Symmetric Key Primitives” and Submitted in Partial Fulfillment of the Requirements for the Degree Of
Which Estream Ciphers Have Been Broken?
Efficient HMAC Based Message Authentication System for Mobile Environment
Comparative Study of DECIM-128 and DECIMV2 in Relation to Compact Hash-Based Message Authentication Code P.Venkateswara Rao, K.Seetha Devi, CH.V
Cryptanalysis of Stream Cipher DECIM