Author:
Ding Lin,Jin Chenhui,Guan Jie,Zhang Shaowu,Cui Ting,Han Dong,Zhao Wei
Publisher
Oxford University Press (OUP)
Reference33 articles.
1. Nawaz Y. Gong G. (2005) The WG Stream Cipher. ECRYPT Stream Cipher Project Report 2005/033. http://www.ecrypt.eu.org/stream/ (accessed April 29, 2005).
2. Gong G. Youssef A. (2002) Cryptographic properties of the Welch–Gong transformation sequence generators. IEEE Trans. Inf. Theory, 11, 2837–2846.
3. Wu H. Preneel B. (2005) Chosen IV Attack on Stream Cipher WG. ECRYPT Stream Cipher Project Report 2005/045. http://www.ecrypt.eu.org/stream/ (accessed July 5, 2005).
4. Wu H. Preneel B. (2006) Resynchronization Attacks on WG and LEX. Proc. FSE 2006, Graz, Austria, March 15–17, pp. 422–432. Springer, Berlin.
5. Nawaz Y. Gong G. (2005) Preventing Chosen IV Attack on WG Cipher by Increasing the Length of Key/IV Setup. ECRYPT Stream Cipher Project Report 2005/047. http://www.ecrypt.eu.org/stream/ (accessed July 6, 2005).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献