E0 (cipher)
Top View
- SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic
- On the Parallelization of the MICKEY-128 2.0 Stream Cipher
- A Note on Stream Ciphers That Continuously Use the IV
- Stream Ciphers
- Structural Classification of Authenticated Encryption Schemes
- Comparison of the Hardware Implementation of Stream Ciphers
- Disperse Rotation Operator DRT and Use in Some Stream Ciphers
- Improved Cryptanalysis of the Stream Cipher Polar Bear
- Guide to Bluetooth Security
- LNCS 3797, Pp
- Understanding Cryptography by Christof Paar .Pdf
- A Comparison of Sw/Hw Implementations of Stream Cipher Encoders
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis⋆
- Cryptanalysis of Grain
- Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
- A Simple AEAD Scheme a Submission to the NIST Lightweight Cryptography Standardization Process
- Security Analysis of Chacha20-Poly1305 AEAD
- Distinguishing Attack on the ABC V.1 and V .2