DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SOBER
SOBER
Algebraic Attacks on SOBER-T32 and SOBER-T16 Without Stuttering
VMPC-MAC: a Stream Cipher Based Authenticated Encryption Scheme
Improved Correlation Attacks on SOSEMANUK and SOBER-128
SOBER: a Stream Cipher Based on Linear Feedback Over GF\(2N\)
Cryptanalysis Techniques for Stream Cipher: a Survey
Non-Randomness in Estream Candidates Salsa20 and TSC-4
Alternating Step Generator Using FCSR and Lfsrs: a New Stream Cipher
Fault Analysis of Stream Ciphers
Cache Timing Analysis of LFSR-Based Stream Ciphers
The Switching Generator: New Clock-Controlled Generator with Resistance Against the Algebraic and Side Channel Attacks
Cache Timing Analysis of Estream Finalists
The Cultural Contradictions of Cryptography: a History of Secret Codes in Modern America
Encrypted Extremism: Inside the English-Speaking Islamic State
Two Versions of the Stream Cipher Snow a Thesis Submitted to the Graduate School of Natural and Applied Sciences of Middle East
Chosen-Ciphertext Attacks Against MOSQUITO
Cache Timing Analysis of LFSR-Based Stream Ciphers
Stream Ciphers: a Comparative Study of Attacks and Structures
A Stream Cipher Algorithm Using Dynamic Feedback Control
Top View
Design of a Lightweight Stream Cipher: BOKHARI 256
Pdf 801.15 K
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Libtomcrypt Developer Manual
Susceptibility of Estream Candidates Towards Side Channel Analysis 125 Evaluated in Two Categories of Applications
Twofish: a 128-Bit Block Cipher
On the Role of the Inner State Size in Stream Ciphers
Comparative Analysis of Structures and Attacks on Various Stream Ciphers
Massachusetts Sober Housing Mobile Application
Stream Cipher the Operation of the Keystream Generator in A5/1, A
The Big Book of Alcoholics Anonymous, and I Left There Know- Ing That the Only Hope for Me Was the Twelve Steps
Tech Trends 2020
Synchronization and Dynamical Systems: Application to Cryptography
Thesis Has Focused on the Cryptanalysis of Cryptographic Primitives Especially Stream Ciphers Which Is an Important Topic in Cryptography
Cascade Jump Controlled Sequence Generator (CJCSG)
"Analysis and Implementation of HC-128 Stream Cipher"
Distinguishing Attack on the ABC V.1 and V .2
DEVELOPMENT of a NEW ALGORITHM for KEY and S-BOX GENERATION in BLOWFISH ALGORITHM 1. Introduction
4.2 Cipher Categorisation
Arxiv:0810.1858V1 [Cs.CR] 10 Oct 2008 Nw Htso Nksd O Xs Ic Nksete Hiber Either Snakes Since Exist Not Is Do It However, Snakes SNOW
An Overview of Estream Ciphers
Primitive Specification for SOBER-128
Fermat's Little Theorem
NESSIE Reports [Stream Cipher]
On Cryptographic Properties of LFSR-Based Pseudorandom Generators
Cryptanalysis of Cryptographic Primitives and Related Topics
Turing: a Fast Stream Cipher
Doctor of Pbltagopbp