DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SFINKS
SFINKS
Cryptanalysis of Sfinks*
Adding MAC Functionality to Edon80
Analysis of Lightweight Stream Ciphers
"Analysis and Implementation of RC4 Stream Cipher"
Secured Data Transmission Using RC4 Algorithm: Encrypting and Decrypting Double Byte Data 1 2 3 SAIPRIYA SAMALA , P.NAVITHA , DR
Developing a Hardware Evaluation Method for SHA-3 Candidates
Hardware Accelerator for Stream Cipher Spritz
Micro Genetic Algorithm (Mga) Group Optimization Methods for Engineers
SFINKS: a Synchronous Stream Cipher for Restricted Hardware Environments ?
The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Comparison of FPGA-Targeted Hardware Implementations of Estream Stream Cipher Candidates
The Estream Project
State Convergence in Bit-Based Stream Ciphers∗
Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions
On the Parallelization of the MICKEY-128 2.0 Stream Cipher
Analysis of Authenticated Encryption Stream Ciphers
Cryptanalysis of Lightweight Cryptographic Algorithms
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Top View
Power Analysis of Stream Ciphers Based on Feedback Shift Registers
A Method of Construction of Balanced Functions with Optimum Algebraic Immunity
Blostream: a High Speed Stream Cipher
Randomness in Digital Cryptography
Hardware Evaluation of Estream Candidates
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
The Design and Analysis of Symmetric Cryptosystems
Algebraic Attacks on Clock-Controlled Stream Ciphers
High Throughput Hardware Implementation for Rc4 Stream Cipher 1 M
Comparison of Hardware Performance of Selected Phase II Estream Candidates
Classification of Cryptographic Libraries
Cycle Counts for Authenticated Encryption
Which Estream Ciphers Have Been Broken?
Hardware Accelerator for Stream Cipher Spritz
Boolean Functions for Cryptography and Error Correcting Codes
Design and Hardware Implementation for RC4 Stream Cipher by Using Verilog HDL 1 2 A
3 Interwar Period (1919-1939): the Victory of the Khazar Theory
4.2 Cipher Categorisation
Efektywność Szyfrów Strumieniowych W Układach Programowalnych
Secure Stream Cipher Initialisation Processes
An Overview of Estream Ciphers
Which Estream Ciphers Have Been Broken?
The New Age of Russia Occult and Esoteric Dimensions
Attacks in Stream Ciphers: a Survey
VLSI Circuits for Cryptographic Authentication
Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions