DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Trivium (cipher)

Trivium (cipher)

  • Stream Ciphers

    Stream Ciphers

  • Algebraic Analysis of Trivium-Like Ciphers

    Algebraic Analysis of Trivium-Like Ciphers

  • Analysis of Lightweight Stream Ciphers

    Analysis of Lightweight Stream Ciphers

  • Slid Pairs in Salsa20 and Trivium

    Slid Pairs in Salsa20 and Trivium

  • Extending the Salsa20 Nonce

    Extending the Salsa20 Nonce

  • Golden Fish an Intelligent Stream Cipher Fuse Memory Modules

    Golden Fish an Intelligent Stream Cipher Fuse Memory Modules

  • Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery

    Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery

  • Computer Science and Cybersecurity (Cs&Cs

    Computer Science and Cybersecurity (Cs&Cs

  • Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA

    Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA

  • Response to “Slid Pairs in Salsa20 and Trivium”

    Response to “Slid Pairs in Salsa20 and Trivium”

  • Analysis of Area-Efficiency Vs. Unrolling for Estream Hardware Portfolio Stream Ciphers

    Analysis of Area-Efficiency Vs. Unrolling for Estream Hardware Portfolio Stream Ciphers

  • Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery?

    Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery?

  • Stream Ciphers Rivest Cipher 4 (RC4)

    Stream Ciphers Rivest Cipher 4 (RC4)

  • Floating Fault Analysis of Trivium

    Floating Fault Analysis of Trivium

  • A Key-Recovery Attack on 855-Round Trivium

    A Key-Recovery Attack on 855-Round Trivium

  • LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices

    LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices

  • Analysis of RC4 Encryption Algorithm

    Analysis of RC4 Encryption Algorithm

  • Introduction to Cryptography: Homework 2

    Introduction to Cryptography: Homework 2

Top View
  • Performance Analysis of Secured Synchronous Stream Ciphers
  • The Estream Project
  • Design Methodology of Secure Rfid Tag Implementation
  • Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
  • On Statistical Analysis of Synchronous Stream Ciphers
  • On the Hardness of Trivium and Grain with Respect to Generic Time-Memory-Data Tradeoff Attacks
  • Pseudo-Boolean Black-Box Optimization Methods in the Context of Divide-And-Conquer Approach to Solving Hard SAT Instances
  • Algebraic and Correlation Attacks Against Linearly Filtered Non Linear Feedback Shift Registers
  • Hardware Evaluation of Estream Candidates
  • Neutrality-Based Symmetric Cryptanalysis
  • Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
  • Which Phase-3 Estream Ciphers Provide the Best Software Speeds?
  • Comparison of Hardware Performance of Selected Phase II Estream Candidates
  • New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
  • On the Design of Trivium
  • Which Estream Ciphers Have Been Broken?
  • Algebraic Analysis of Trivium-Like Ciphers (Poster)
  • Vulnerability Analysis of Salsa20 Differential Analysis and Deep Learning Analysis of Salsa20


© 2024 Docslib.org    Feedback