Author:
Ahmadian Zahra,Mohajeri Javad,Salmasizadeh Mahmoud,Hakala Risto M.,Nyberg Kaisa
Subject
Hardware and Architecture,Information Systems,Software
Reference15 articles.
1. Distinguishing attack on SOBER-128 with linear masking;Cho,2006
2. Crossword Puzzle attack on NLS;Cho,2006
3. Cryptanalysis of stream ciphers with linear masking;Coppersmith,2002
4. ECRYPT Network of Excellence, 2008. The homepage for eSTREAM. .
5. Hassanzadeh, M.M., Parker, M.G., Helleseth, T., Salehani, Y.E., Sohizadeh Abyaneh, M.R., 2008. Differential distinguishing attack on the Shannon stream cipher based on fault analysis. In: International Symposium on Telecommunications, IST 2008, pp. 671–676.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献