Author:
Li Jie,Zheng Jianliang,Whitlock Paula
Subject
Applied Mathematics,Modelling and Simulation,Numerical Analysis,General Computer Science,Theoretical Computer Science
Reference26 articles.
1. Cryptanalytic time/memory/data tradeoffs for stream ciphers;Biryukov,2000
2. Cryptanalysis of stream ciphers with linear masking;Coppersmith,2002
3. D. Davis, R. Ihaka, P. Fenstermacher, Cryptographic randomness from air turbulence in disk drives, in: Advances in Cryptology–Crypto’94, Springer, pp. 114–120.
4. P. Flajolet, A.M. Odlyzko, Random mapping statistics, in: Advances in cryptology–EUROCRYPT’89, vol. 434, Lecture Notes in Computer Science, Springer, pp. 329–354.
5. S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in: Selected Areas in Cryptography, Springer, pp. 1–24.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献