DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» MICKEY
MICKEY
A Differential Fault Attack on MICKEY
On the Design and Analysis of Stream Ciphers Hell, Martin
MICKEY 2.0. 85: a Secure and Lighter MICKEY 2.0 Cipher Variant With
New Developments in Cryptology Outline Outline Block Ciphers AES
Analysis of Lightweight Stream Ciphers
Differential Fault Analysis of MICKEY Family of Stream Ciphers
IN Ronald J. Ambrosetti a Dissertation Submitted to the Graduate School
Analysis of Area-Efficiency Vs. Unrolling for Estream Hardware Portfolio Stream Ciphers
Sliscp: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives
A New Family of Boolean Functions with Good Cryptographic Properties
Jump Index in T-Functions for Designing a New Basic Structure of Stream Ciphers Ali Hadipour, Seyed Mahdi Sajadieh and Raheleh Afifi
The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices
Comparison of FPGA-Targeted Hardware Implementations of Estream Stream Cipher Candidates
Algorithms, Key Size and Parameters Report – 2014
The Estream Project
On the Parallelization of the MICKEY-128 2.0 Stream Cipher
Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications K
Top View
Correlated Keystreams in Moustique
Light-Weight Crypto: Rabbit Prof Bill Buchanan, the Cyber Academy Light-Weight Crypto • Conventional Cryptography
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
On Statistical Analysis of Synchronous Stream Ciphers
Comparison of FPGA-Targeted Hardware Implementations of Estream Stream Cipher Candidates
Lightweight Cryptography Methods
The Stream Cipher MICKEY (Version 1) Algorithm Specification Issue 1.0
LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Hardware Evaluation of Estream Candidates
Symmetric Crypto in Software
Comparison of Hardware Performance of Selected Phase II Estream Candidates
Cycle Counts for Authenticated Encryption
Which Estream Ciphers Have Been Broken?
Instruction Set Extensions for Support of Cryptography on Embedded Systems
Thèse De Doctorat Ons JALLOULI
Cryptanalysis of Stream Cipher
4.2 Cipher Categorisation
An Introduction to New Stream Cipher Designs Ways of Turning Your Data Into Line Noise
Secure Stream Cipher Initialisation Processes
A High-Speed Hardware Implementation of the Hermes8-128 Stream Cipher
Transformation and Security Analysis of NLFSR-Based Stream Ciphers
Sliscp: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives
Elementary Cryptography Welcome to the Quantum Era!
Side Channel Attacks on Symmetric Key Primitives” and Submitted in Partial Fulfillment of the Requirements for the Degree Of
Matthew Robshaw 2008.Pdf
Which Estream Ciphers Have Been Broken?
Cryptography at Large
Introduction
Public Comments Received on NISTIR 8114: Draft Report on Lightweight Cryptography (Comment Period Closed: 10/31/2016)
Cryptanalysis of Cryptographic Primitives and Related Topics
Comparison of Hardware Performance of Selected Phase II Estream Candidates