DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Phelix

Phelix

  • Failures of Secret-Key Cryptography D

    Failures of Secret-Key Cryptography D

  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond

    Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond

  • Hardware Implementation of the Salsa20 and Phelix Stream Ciphers

    Hardware Implementation of the Salsa20 and Phelix Stream Ciphers

  • Iris Um Oifig Maoine Intleachtúla Na Héireann Journal of the Intellectual Property Office of Ireland

    Iris Um Oifig Maoine Intleachtúla Na Héireann Journal of the Intellectual Property Office of Ireland

  • "Analysis and Implementation of RC4 Stream Cipher"

  • Stream Ciphers – an Overview

    Stream Ciphers – an Overview

  • Hardware Implementation of the Salsa20 and Phelix Stream Ciphers

    Hardware Implementation of the Salsa20 and Phelix Stream Ciphers

  • The Salsa20 Family of Stream Ciphers

    The Salsa20 Family of Stream Ciphers

  • High Speed Reconfigurable Architecture for Phelix

    High Speed Reconfigurable Architecture for Phelix

  • Cycle Counts for Authenticated Encryption

    Cycle Counts for Authenticated Encryption

  • Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm

    Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm

  • Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks

    Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks

  • The Estream Project

    The Estream Project

  • Analysis of Stream Cipher Based Authenticated Encryption Schemes

    Analysis of Stream Cipher Based Authenticated Encryption Schemes

  • Download (161Kb)

    Download (161Kb)

  • Why IV Setup for Stream Ciphers Is Difficult

    Why IV Setup for Stream Ciphers Is Difficult

  • Breaking NLM-MAC Generator

    Breaking NLM-MAC Generator

  • Cipher Suites - the Cryptographic Computations in Routing of Mobile Ad Hoc Networks (MANET)

    Cipher Suites - the Cryptographic Computations in Routing of Mobile Ad Hoc Networks (MANET)

Top View
  • Introduction to Cryptanalysis: Attacking Stream Ciphers
  • Related-Key Attacks Against Full Hummingbird-2
  • Stream Cipher the Operation of the Keystream Generator in A5/1, A
  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
  • Comparison of Hardware Performance of Selected Phase II Estream Candidates
  • Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
  • Cycle Counts for Authenticated Encryption
  • Which Estream Ciphers Have Been Broken?
  • Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
  • Design and Primitive Specification for Shannon Philip Hawkes, Cameron Mcdonald, Michael Paddon, Gregory G
  • Elsiefour: a Low-Tech Authenticated Encryption Algorithm for Human-To-Human Communication
  • Differential-Linear Attacks Against the Stream Cipher Phelix⋆
  • Matthew Robshaw 2008.Pdf
  • Which Estream Ciphers Have Been Broken?
  • Stream Ciphers
  • Comprehensive Survey on the Constructional Design of Existing Stream Ciphers
  • The Climate Crisis Won't Wait
  • Cryptanalysis of Stream Cipher


© 2024 Docslib.org    Feedback