-
1Academic Journal
المؤلفون: Nyberg, Kaisa, Hakala, Risto
المساهمون: Kaisa Nyberg and Risto Hakala
مصطلحات موضوعية: Linear approximations, correlation, linear cryptanalysis, key recovery attack, piling-up lemma, SOBER-128
وصف الملف: application/pdf
Relation: Is Part Of Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007); https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.4
-
2
المؤلفون: Dai Wantanabe, Toshinobu Kaneko, Soichi Furuya
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1166-1172
مصطلحات موضوعية: Authenticated encryption, CBC-MAC, Computer science, business.industry, Applied Mathematics, Stream cipher attack, Sponge function, Encryption, Computer security, computer.software_genre, Computer Graphics and Computer-Aided Design, Signal Processing, SOBER-128, Message authentication code, Electrical and Electronic Engineering, Challenge–response authentication, business, computer, Computer network
-
3
المصدر: Information Security and Cryptology ISBN: 9783642385186
Inscryptمصطلحات موضوعية: Nonlinear filter, Computer science, Hash function, Matrix representation, SOBER-128, State (computer science), Collision, Algorithm, Stream cipher, Generator (mathematics)
-
4
المؤلفون: Miia Hermelin, Joo Yeon Cho
المصدر: Information, Security and Cryptology – ICISC 2009 ISBN: 9783642144226
ICISCمصطلحات موضوعية: Theoretical computer science, Computer science, SOSEMANUK, Linear cryptanalysis, SOBER-128, eSTREAM, Data complexity, Algorithm, Stream cipher
-
5Academic Journal
المؤلفون: Cho, Joo, Pieprzyk, Josef
المصدر: Lecture Notes in Computer Science
مصطلحات موضوعية: Distinguishing attack, Linear masking, Modular addition, SOBER-128, Stream ciphers
Relation: Cho, Joo & Pieprzyk, Josef (2006) Distinguishing attack on SOBER-128 with linear masking. Lecture Notes in Computer Science, 4058, pp. 29-39.; https://eprints.qut.edu.au/73406/; Science & Engineering Faculty
الاتاحة: https://eprints.qut.edu.au/73406/
-
6Dissertation/ Thesis
المؤلفون: ALMashrafi, Mufeed Juma
مصطلحات موضوعية: authenticated encryption, stream cipher, symmetric cipher, cryptanalysis, algebraic analysis, system of equations, SSS, ZUC, MACs, Grain-128a, 128-EIA, 128- EEA, multivariate equations, sfinks, SNOW-3G, SOBER-128, NLSv2, UEA2, UIA2, birthday attacks, forgery attacks, algebraic attacks, collision attacks, sidechannel attacks
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/60916/1/Mufeed_ALMashrafi_Thesis.pdf; ALMashrafi, Mufeed Juma (2012) Analysis of stream cipher based authenticated encryption schemes. PhD thesis, Queensland University of Technology.; https://eprints.qut.edu.au/60916/; Faculty of Science and Technology; Information Security Institute
الاتاحة: https://eprints.qut.edu.au/60916/
-
7
المؤلفون: Kaisa Nyberg, Risto Hakala
المصدر: Aalto University
مصطلحات موضوعية: correlation, Linear approximations, SOBER-128, linear cryptanalysis, piling-up lemma, key recovery attack
-
8
المؤلفون: Josef Pieprzyk, Joo Yeon Cho
المصدر: Information Security and Privacy ISBN: 9783540354581
ACISPمصطلحات موضوعية: Quadratic equation, Cipher, Keystream, SOBER-128, Linear approximation, Linear combination, Algorithm, Stream cipher, Distinguishing attack, Mathematics
-
9
المؤلفون: Soichi Furuya, Dai Watanabe
المصدر: Fast Software Encryption ISBN: 9783540221715
FSEمصطلحات موضوعية: Differential cryptanalysis, ComputingMilieux_THECOMPUTINGPROFESSION, Computer science, media_common.quotation_subject, Rose (topology), Computer security model, Computer security, computer.software_genre, SOBER-128, Message authentication code, Function (engineering), computer, Stream cipher, media_common
-
10Dissertation/ Thesis
المؤلفون: Hakala, Risto
المساهمون: Teknillinen korkeakoulu, Helsinki University of Technology, Tietotekniikan osasto, Nyberg, Kaisa, Aalto-yliopisto, Aalto University
مصطلحات موضوعية: stream ciphers, linear cryptanalysis, distinguishing attacks, linear approximations, T-functions, SOBER-128, Shannon, jonosalausmenetelmät, lineaarinen kryptoanalyysi, erotteluhyökkäykset, lineaariset approksimaatiot, T-funktiot
وصف الملف: application/pdf
Relation: https://aaltodoc.aalto.fi/handle/123456789/95175; URN:NBN:fi:aalto-2020120554009
-
11Academic Journal
المؤلفون: Joo Yeon Cho, Josef Pieprzyk
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Distinguishing attack, Stream ciphers, Linear masking, Modular addition, SOBER-128
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8368; http://www.ics.mq.edu.au/~jcho/mypapers/da-s128.pdf