DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Trivium (cipher)
Trivium (cipher)
Stream Ciphers
Algebraic Analysis of Trivium-Like Ciphers
Analysis of Lightweight Stream Ciphers
Slid Pairs in Salsa20 and Trivium
Extending the Salsa20 Nonce
Golden Fish an Intelligent Stream Cipher Fuse Memory Modules
Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery
Computer Science and Cybersecurity (Cs&Cs
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
Response to “Slid Pairs in Salsa20 and Trivium”
Analysis of Area-Efficiency Vs. Unrolling for Estream Hardware Portfolio Stream Ciphers
Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery?
Stream Ciphers Rivest Cipher 4 (RC4)
Floating Fault Analysis of Trivium
A Key-Recovery Attack on 855-Round Trivium
LIZARD – a Lightweight Stream Cipher for Power-Constrained Devices
Analysis of RC4 Encryption Algorithm
Introduction to Cryptography: Homework 2
Top View
Performance Analysis of Secured Synchronous Stream Ciphers
The Estream Project
Design Methodology of Secure Rfid Tag Implementation
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
On Statistical Analysis of Synchronous Stream Ciphers
On the Hardness of Trivium and Grain with Respect to Generic Time-Memory-Data Tradeoff Attacks
Pseudo-Boolean Black-Box Optimization Methods in the Context of Divide-And-Conquer Approach to Solving Hard SAT Instances
Algebraic and Correlation Attacks Against Linearly Filtered Non Linear Feedback Shift Registers
Hardware Evaluation of Estream Candidates
Neutrality-Based Symmetric Cryptanalysis
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Which Phase-3 Estream Ciphers Provide the Best Software Speeds?
Comparison of Hardware Performance of Selected Phase II Estream Candidates
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
On the Design of Trivium
Which Estream Ciphers Have Been Broken?
Algebraic Analysis of Trivium-Like Ciphers (Poster)
Vulnerability Analysis of Salsa20 Differential Analysis and Deep Learning Analysis of Salsa20
The Salsa20 Stream Cipher for Transport Layer Security
Understanding Cryptography
A High-Level Rapid Prototyping Framework for Stream Ciphers
Recent Results on Stream Ciphers
TRIAD V1 – a Lightweight AEAD and Hash Function Based on Stream Cipher Cover Sheet
Cryptanalysis of Cryptographic Primitives and Related Topics
Stream Ciphers in the Iot: Grain and Trivium
A New Stream Cipher Inspired by Trivium