Sosemanuk, a fast software-oriented stream cipher

被引:0
|
作者
Orange Labs, France [1 ]
不详 [2 ]
不详 [3 ]
不详 [4 ]
不详 [5 ]
不详 [6 ]
不详 [7 ]
不详 [8 ]
不详 [9 ]
机构
来源
Lect. Notes Comput. Sci. | 2008年 / 98-118期
关键词
Snow;
D O I
10.1007/978-3-540-68351-3_9
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] SOS: A Software-Oriented Distributed Shared Cache Management Approach for Chip Multiprocessors
    Jin, Lei
    Cho, Sangyeun
    18TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PROCEEDINGS, 2009, : 361 - 371
  • [32] FORK-160: A New 160 - bit Software-Oriented Hash Function
    Tabatabaee, Amir Hossein
    Esmaeili, Yaser
    Abyaneh, Mohammad Reza Sohizadeh
    Ahmadi, Hadi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 177 - 186
  • [33] A new fast stream cipher: MAJE4
    Mathew, S
    Jacob, KP
    INDICON 2005 PROCEEDINGS, 2005, : 60 - 63
  • [34] Software-oriented system-level simulation for design space exploration of reconfigurable architectures
    Tham, KS
    Maskell, DL
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, PROCEEDINGS, 2005, 3740 : 391 - 404
  • [35] CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software
    Das, Sourav
    Chowdhury, Dipanwita Roy
    CELLULAR AUTOMATA, ACRI 2012, 2012, 7495 : 601 - 610
  • [36] Fast Software implementation of the block cipher uBlock algorithm
    Gao, Ying
    Wang, Longxin
    Tian, Lei
    Hu, Yang
    Zhang, Yupeng
    Yan, Yu
    Wu, Qianhong
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 46 (06): : 96 - 106
  • [37] Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors
    Clapp, CSK
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 273 - 287
  • [38] Fast Correlation Attacks on K2 Stream Cipher
    Ma, Sudong
    Jin, Chenhui
    Guan, Jie
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5426 - 5439
  • [39] The concept of using software-oriented management to ensure balanced development of regional transport system
    Hanaliev, G., I
    TERRA ECONOMICUS, 2011, 9 (02): : 161 - 164
  • [40] Correlation power analysis attack on software implementation of TRIVIUM stream cipher
    De Silva, Rangana
    Navarathna, Iranga
    Kumarasiri, Malitha
    Chuah, Chai Wen
    Alawatugoda, Janaka
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 379 - 401