Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
SNOW - MaRDI portal

SNOW

From MaRDI portal
Software:31381



swMATH19554MaRDI QIDQ31381


No author found.





Related Items (35)

A triangular class of skew maximum-period polynomialsOn modes of operations of a block cipher for authentication and authenticated encryptionFast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0Revisit two memoryless state-recovery cryptanalysis methods on A5/1Unnamed ItemDesigning integrated accelerator for stream ciphers with structural similaritiesA correlation attack on full SNOW-V and SNOW-ViMaD2: An Ultra-Performance Stream Cipher for Pervasive Data EncryptionHigher order differentiation over finite fields with applications to generalising the cube attackRandomized nonlinear software-oriented MDS diffusion layersEfficient and extensive search for precise linear approximations with high correlations of full SNOW-VOn algebraic immunity of trace inverse functions on finite fields of characteristic twoFast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3GGuess-and-determine attacks on SNOW-Vi stream cipherA method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element fieldMultidimensional linear distinguishing attacks and Boolean functionsDifferential Fault Analysis of SosemanukFast Correlation Attacks: Methods and CountermeasuresThe Software Performance of Authenticated-Encryption ModesLinear Approximations of Addition Modulo 2n-1Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRsA general mixing strategy for the ECB-Mix-ECB mode of operationModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorCryptanalysis of Sosemanuk and SNOW 2.0 Using Linear MasksCryptographic properties of cyclic binary matricesUpper bounds on the imbalance of discrete functions implemented by sequences of finite automataQUAD: A multivariate stream cipher with provable securityDeterministic chaotic finite-state automataAn overview of distinguishing attacks on stream ciphersHiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream CiphersCryptanalysis of the FLIP Family of Stream CiphersWhen lagged Fibonacci generators jumpDesign and Test of Pseudorandom Number Generator Using a Star Network of Lorenz OscillatorsThe method for constructing uniform planar approximations of the filter generatorImplementing Grover oracles for quantum key search on AES and LowMC


This page was built for software: SNOW