DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» LEX (cipher)
LEX (cipher)
Statistical Attack on RC4 Distinguishing WPA
Security in Wireless Sensor Networks Using Cryptographic Techniques
Stream Cipher Designs: a Review
AEGIS: a Fast Authenticated Encryption Algorithm⋆ (Full Version)
MICKEY 2.0. 85: a Secure and Lighter MICKEY 2.0 Cipher Variant With
Lex Mercatoria: Electronic Commerce and Encryption Pages
ACORN: a Lightweight Authenticated Cipher (V2)
Efficient Implementation of Stream Ciphers on Embedded Processors
Lex Cryptographia – the Role of a Principles-Based Approach in Blockchain/DLT Regulation Master Thesis Law & Technology, Tilburg University
The Estream Project
ALE: AES-Based Lightweight Authenticated Encryption
Cycle Counts for Authenticated Encryption
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
The Lazarus Constellation
Download (161Kb)
Marcin Rogawski
Why IV Setup for Stream Ciphers Is Difficult
DSP-128: Stream Cipher Based on Discrete Log Problem and Polynomial Arithmetic
Top View
Latin Dances Revisited: New Analytic Results of Salsa20 and Chacha”
Bitstream Modification of Trivium
Twelex: a Tweaked Version of the LEX Stream Cipher
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Electronic Commerce and Encryption Pages
Which Phase-3 Estream Ciphers Provide the Best Software Speeds?
Differential Fault Analysis Of
Twelex: a Tweaked Version of the LEX Stream Cipher
“Cryptography and Data Security: from Cryptographic Techniques to Data Protection”
Differential Fault Analysis Of
Cycle Counts for Authenticated Encryption
Applicable Light-Weight Cryptography to Secure Medical Data in Iot Systems
Which Estream Ciphers Have Been Broken?
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Gröbner Bases Techniques in Cryptography
Motorola Lex L11 (MDFPP31/WLANCEP10) Security Target
On the Internal Structure of the Advanced Encryption Standard and Two AES-Based Cryptographic Constructions Jianyong Huang University of Wollongong
Symmetric Blind Decryption with Perfect Secrecy Juha Partala
A New Attack on the LEX Stream Cipher
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Secure Stream Cipher Initialisation Processes
LEX L0 Secure Mobile Platform
Lightweight Cryptography
A Generic Security API for Symmetric Key Management on Cryptographic Devices
INFOS 2007 Paper Template
Attacks in Stream Ciphers: a Survey
Attacking the IV Setup of Stream Cipher LEX
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
AEGIS: a Fast Authenticated Encryption Algorithm (V1.1)
Salsa20/8 and Salsa20/12