DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  E0 (cipher)

E0 (cipher)

  • A Uniform Framework for Cryptanalysis of the Bluetooth E0

    A Uniform Framework for Cryptanalysis of the Bluetooth E0

  • (Not) to Design and Implement Post-Quantum Cryptography

    (Not) to Design and Implement Post-Quantum Cryptography

  • Weak Keys for AEZ, and the External Key Padding Attack

    Weak Keys for AEZ, and the External Key Padding Attack

  • Generic Attacks on Stream Ciphers

    Generic Attacks on Stream Ciphers

  • Stream Cipher Designs: a Review

    Stream Cipher Designs: a Review

  • Energy, Performance, Area Versus Security Trade-Offs for Stream Ciphers

    Energy, Performance, Area Versus Security Trade-Offs for Stream Ciphers

  • Analysis of Lightweight Stream Ciphers

    Analysis of Lightweight Stream Ciphers

  • Stream Ciphers – an Overview

    Stream Ciphers – an Overview

  • Thesis Organization

    Thesis Organization

  • Weak-Key Distinguishers for AES

    Weak-Key Distinguishers for AES

  • LNCS 3357, Pp

    LNCS 3357, Pp

  • Lecture 12: Stream Ciphers in Practice

    Lecture 12: Stream Ciphers in Practice

  • Disproof of Li An-Ping's Claims Regarding Salsa20

    Disproof of Li An-Ping's Claims Regarding Salsa20

  • A Survey on RC4 Stream Cipher

    A Survey on RC4 Stream Cipher

  • Official Comments (Round 2)

    Official Comments (Round 2)

  • LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices

    LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices

  • Analysis of RC4 Encryption Algorithm

    Analysis of RC4 Encryption Algorithm

  • The One Time Pad

    The One Time Pad

Top View
  • SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic
  • On the Parallelization of the MICKEY-128 2.0 Stream Cipher
  • A Note on Stream Ciphers That Continuously Use the IV
  • Stream Ciphers
  • Structural Classification of Authenticated Encryption Schemes
  • Comparison of the Hardware Implementation of Stream Ciphers
  • Disperse Rotation Operator DRT and Use in Some Stream Ciphers
  • Improved Cryptanalysis of the Stream Cipher Polar Bear
  • Guide to Bluetooth Security
  • LNCS 3797, Pp
  • Understanding Cryptography by Christof Paar .Pdf
  • A Comparison of Sw/Hw Implementations of Stream Cipher Encoders
  • Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis⋆
  • Cryptanalysis of Grain
  • Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
  • A Simple AEAD Scheme a Submission to the NIST Lightweight Cryptography Standardization Process
  • Security Analysis of Chacha20-Poly1305 AEAD
  • Distinguishing Attack on the ABC V.1 and V .2


© 2024 Docslib.org    Feedback