Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Lecture Notes in Computer Science;F. Armknecht,2004
2. Lecture Notes in Computer Science;E. Biham,1991
3. Lecture Notes in Computer Science;A. Biryukov,1999
4. Biryukov, A.: A New 128-bit Key Stream Cipher LEX. ECRYPT Stream Cipher Project Report 2005/013 (2005), Available at,
http://www.ecrypt.eu.org/stream/
5. Lecture Notes in Computer Science;J. Daemen,1994
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The welch-gong stream cipher - evolutionary path;Cryptography and Communications;2023-08-05
2. Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021
3. Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers;Lecture Notes in Computer Science;2017
4. Cryptanalysis of WG Family of Stream Ciphers;The Computer Journal;2015-04-20
5. Flaws in the Initialisation Process of Stream Ciphers;Computation, Cryptography, and Network Security;2015