DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» WG (cipher)
WG (cipher)
The WG Stream Cipher
A Somewhat Historic View of Lightweight Cryptography
WAGE: an Authenticated Encryption with a Twist
The Dawn of American Cryptology, 1900–1917
Implementation of WG Cipher with High Security
The Switching Generator: New Clock-Controlled Generator with Resistance Against the Algebraic and Side Channel Attacks
WAGE: an Authenticated Cipher Submission to the NIST LWC Competition
Hardware Implementations of Multi-Output Welch-Gong Ciphers
Design of Stream Ciphers (PDF)
A Lightweight Stream Cipher for Resource-Constrained Smart Devices
WG Stream Cipher Based Encryption Algorithm
FPGA Implementation of WG Stream Cipher
Chaos-Based Crypto and Joint Crypto-Compression Systems for Images and Videos Mousa Farajallah
The Estream Project
State Convergence in Bit-Based Stream Ciphers∗
Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions
Cryptanalysis of Lightweight Cryptographic Algorithms
Cryptographic Technology Guideline (Lightweight Cryptography)
Top View
Proxy Re-Encryption: Analysis of Constructions and Its Application to Secure Access Delegation”, Journal of Network and Computer Applications, Vol
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Edit Distance Correlation Attack on the Alternating Step Generator
Design and Hardware Implementation of a Novel Scrambling Security Algorithm for Robust Wireless Local Area Networks
Privacy and Authentication: an Introduction to Cryptography
Hardware Evaluation of Estream Candidates
Algebraic Attacks on Clock-Controlled Stream Ciphers
WAGE Specification
Cryptography - a Brief History •
Which Estream Ciphers Have Been Broken?
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
The WG Stream Cipher
Cryptanalysis of WG-7: a Lightweight Stream Cipher
Cryptology Through History and Inquiry
New Implementations of the WG Stream Cipher Hayssam El-Razouk, Arash Reyhani-Masoleh, Member, IEEE, and Guang Gong
128 Bit Stream Cipher for Encryption and Decryption Algorithm
Introduction to Modern Cryptography
Which Estream Ciphers Have Been Broken?
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce
A Concord of Alchemy with Theology: Isaac Newton's Hermeneutics of The
Attacks in Stream Ciphers: a Survey
Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions