SNOW
From MaRDI portal
Software:31381
No author found.
Related Items (35)
A triangular class of skew maximum-period polynomials ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 ⋮ Revisit two memoryless state-recovery cryptanalysis methods on A5/1 ⋮ Unnamed Item ⋮ Designing integrated accelerator for stream ciphers with structural similarities ⋮ A correlation attack on full SNOW-V and SNOW-Vi ⋮ MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Randomized nonlinear software-oriented MDS diffusion layers ⋮ Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G ⋮ Guess-and-determine attacks on SNOW-Vi stream cipher ⋮ A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field ⋮ Multidimensional linear distinguishing attacks and Boolean functions ⋮ Differential Fault Analysis of Sosemanuk ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ Linear Approximations of Addition Modulo 2n-1 ⋮ Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs ⋮ A general mixing strategy for the ECB-Mix-ECB mode of operation ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks ⋮ Cryptographic properties of cyclic binary matrices ⋮ Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Deterministic chaotic finite-state automata ⋮ An overview of distinguishing attacks on stream ciphers ⋮ HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers ⋮ Cryptanalysis of the FLIP Family of Stream Ciphers ⋮ When lagged Fibonacci generators jump ⋮ Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators ⋮ The method for constructing uniform planar approximations of the filter generator ⋮ Implementing Grover oracles for quantum key search on AES and LowMC
This page was built for software: SNOW