DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Souradyuti Paul
Souradyuti Paul
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Distinguishing Attacks on the Stream Cipher Py
Cryptanalysis Techniques for Stream Cipher: a Survey
Design and Analysis of RC4-Like Stream Ciphers
The Truth on Tpy
State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher
Discovery and Exploitation of New Biases in RC4
Discovery and Exploitation of New Biases in RC4
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
On the (In)Security of Stream Ciphers Based on Arrays and Modular Addition ?
New Attacks on Rc4a and Vmpc
Cryptanalysis of Lightweight Cryptographic Algorithms
On the (In) Security of Stream Ciphers Based on Arrays and Modular
Dr. Souradyuti Paul March 15, 2019
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Which Estream Ciphers Have Been Broken?
Distinguishing Attacks on the Stream Cipher Py?
4.2 Cipher Categorisation
Top View
Distinguishing Attacks on the Stream Cipher Py?
Image Encryption Using Gingerbreadman Map and RC4A Stream Cipher
PY (Roo): a Fast and Secure Stream Cipher Using Rolling Arrays
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
ISAAC and RC4 ISAAC and RC4
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers Tpypy and Tpy⋆