DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Phelix
Phelix
Failures of Secret-Key Cryptography D
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
Iris Um Oifig Maoine Intleachtúla Na Héireann Journal of the Intellectual Property Office of Ireland
"Analysis and Implementation of RC4 Stream Cipher"
Stream Ciphers – an Overview
Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
The Salsa20 Family of Stream Ciphers
High Speed Reconfigurable Architecture for Phelix
Cycle Counts for Authenticated Encryption
Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
The Estream Project
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Download (161Kb)
Why IV Setup for Stream Ciphers Is Difficult
Breaking NLM-MAC Generator
Cipher Suites - the Cryptographic Computations in Routing of Mobile Ad Hoc Networks (MANET)
Top View
Introduction to Cryptanalysis: Attacking Stream Ciphers
Related-Key Attacks Against Full Hummingbird-2
Stream Cipher the Operation of the Keystream Generator in A5/1, A
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
Comparison of Hardware Performance of Selected Phase II Estream Candidates
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
Cycle Counts for Authenticated Encryption
Which Estream Ciphers Have Been Broken?
Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive
Design and Primitive Specification for Shannon Philip Hawkes, Cameron Mcdonald, Michael Paddon, Gregory G
Elsiefour: a Low-Tech Authenticated Encryption Algorithm for Human-To-Human Communication
Differential-Linear Attacks Against the Stream Cipher Phelix⋆
Matthew Robshaw 2008.Pdf
Which Estream Ciphers Have Been Broken?
Stream Ciphers
Comprehensive Survey on the Constructional Design of Existing Stream Ciphers
The Climate Crisis Won't Wait
Cryptanalysis of Stream Cipher
Comparison of Hardware Performance of Selected Phase II Estream Candidates
Salsa20/8 and Salsa20/12