Phelix
Top View
- Introduction to Cryptanalysis: Attacking Stream Ciphers
- Related-Key Attacks Against Full Hummingbird-2
- Stream Cipher the Operation of the Keystream Generator in A5/1, A
- Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
- Comparison of Hardware Performance of Selected Phase II Estream Candidates
- Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
- Cycle Counts for Authenticated Encryption
- Which Estream Ciphers Have Been Broken?
- Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
- Design and Primitive Specification for Shannon Philip Hawkes, Cameron Mcdonald, Michael Paddon, Gregory G
- Elsiefour: a Low-Tech Authenticated Encryption Algorithm for Human-To-Human Communication
- Differential-Linear Attacks Against the Stream Cipher Phelix⋆
- Matthew Robshaw 2008.Pdf
- Which Estream Ciphers Have Been Broken?
- Stream Ciphers
- Comprehensive Survey on the Constructional Design of Existing Stream Ciphers
- The Climate Crisis Won't Wait
- Cryptanalysis of Stream Cipher