DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» E0 (cipher)
E0 (cipher)
A Uniform Framework for Cryptanalysis of the Bluetooth E0
(Not) to Design and Implement Post-Quantum Cryptography
Weak Keys for AEZ, and the External Key Padding Attack
Generic Attacks on Stream Ciphers
Stream Cipher Designs: a Review
Energy, Performance, Area Versus Security Trade-Offs for Stream Ciphers
Analysis of Lightweight Stream Ciphers
Stream Ciphers – an Overview
Thesis Organization
Weak-Key Distinguishers for AES
LNCS 3357, Pp
Lecture 12: Stream Ciphers in Practice
Disproof of Li An-Ping's Claims Regarding Salsa20
A Survey on RC4 Stream Cipher
Official Comments (Round 2)
LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices
Analysis of RC4 Encryption Algorithm
The One Time Pad
Top View
SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic
On the Parallelization of the MICKEY-128 2.0 Stream Cipher
A Note on Stream Ciphers That Continuously Use the IV
Stream Ciphers
Structural Classification of Authenticated Encryption Schemes
Comparison of the Hardware Implementation of Stream Ciphers
Disperse Rotation Operator DRT and Use in Some Stream Ciphers
Improved Cryptanalysis of the Stream Cipher Polar Bear
Guide to Bluetooth Security
LNCS 3797, Pp
Understanding Cryptography by Christof Paar .Pdf
A Comparison of Sw/Hw Implementations of Stream Cipher Encoders
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis⋆
Cryptanalysis of Grain
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
A Simple AEAD Scheme a Submission to the NIST Lightweight Cryptography Standardization Process
Security Analysis of Chacha20-Poly1305 AEAD
Distinguishing Attack on the ABC V.1 and V .2
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
RC4 Encryption-A Literature Survey
Applications of Stream Ciphers in Wireless Communications
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's
Vulnerability Analysis of Salsa20 Differential Analysis and Deep Learning Analysis of Salsa20
Guide to Bluetooth Security
LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices
Stream Ciphers for Constrained Environments
ZDD-Based Cryptanalysis of E0 Keystream Generator
ILIAS Ion and Laser Beam Interaction and Application Studies
Analysis of the E0 Encryption System
Cryptanalysis of Block Ciphers: a Survey
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
LFSR-Based Stream Ciphers
Advanced Encryption Standard (AES)
Encryption 101
Grain - a Stream Cipher for Constrained Environments
New Computational and Experimental Approaches for Studying Ion Acceleration and the Intense Laser-Plasma Interaction
Stream Ciphers in the Iot: Grain and Trivium
Breaking RC4 in WPA-TKIP And
ABC: a New Fast Flexible Stream Cipher