Author:
Armknecht Frederik,Meier Willi
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lecture Notes in Computer Science;F. Armknecht,2003
2. Lecture Notes in Computer Science;F. Armknecht,2004
3. Armknecht, F.: On the existence of low-degree equations for algebraic attacks. Cryptology ePrint Archive: Report 2004/185
4. Lecture Notes in Computer Science;E. Biham,2005
5. Lecture Notes in Computer Science;A. Biryukov,2003
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Recent Results on Some Word Oriented Stream Ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G;Information Security and Privacy in the Digital World - Some Selected Topics [Working Title];2022-12-08
2. A fault attack on KCipher-2;International Journal of Computer Mathematics: Computer Systems Theory;2020-12-10
3. A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization;IETE Journal of Research;2017-02-22
4. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems;Cryptography and Security: From Theory to Applications;2012
5. Fault analysis study of the block cipher FOX64;Multimedia Tools and Applications;2011-10-15