Author:
Alekseychuk A. N.,Koniushok S. M.,Poremskyi M. V.
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. P. Ekdahl and T. Johansson, “A new version of the stream cipher SNOW,” in: K. Nyberg and H. Heys (eds.), Selected Areas in Cryptography, SAC 2002; Lecture Notes in Computer Science, Springer, Berlin–Heidelberg, Vol. 2595, 47–61 (2003).
2. ISO/IEC 18033-4: 2011(E), Information technology — Security techniques — Encryption algorithm, Part 4: Stream ciphers (2011).
3. D. Watanabe, A. Biryukov, and C. De Cannière, “A distinguishing attack of SNOW 2.0 with linear masking method,” in: M. Matsui and R. Zuccherato (eds.), Selected Arreas in Cryptography, SAC 2003; Lecture Notes in Computer Science, Springer-Verlag, Berlin–Heidelberg, Vol. 3006, 222–233 (2004).
4. K. Nyberg and J. Wallén, “Improved linear distinguishers for SNOW 2.0,” in: M. J. B. Robshow (ed.), Fast Software Encryption, FSE 2006; Lecture Notes in Computer Science, Springer-Verlag, Heidelberg, Vol. 4047, 144–162 (2006).
5. A. Maximov and Th. Johansson, “Fast computation for large distribution and its cryptographic application,” in: B. Roy (ed.), Advances in Cryptology, ASIACRYPT 2005; Lecture Notes in Computer Science, Springer, Berlin–Heidelberg, Vol. 3788, 313–332 (2005).