共 50 条
- [31] Correlation attacks on stream ciphers [J]. AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
- [32] The Research of Modern Stream Ciphers [J]. 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 207 - 210
- [33] Stream ciphers for GSM networks [J]. ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 80 - 84
- [34] Stream Ciphers and the eSTREAM Project [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 3 - 11
- [35] Observability of permutations, and stream ciphers [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) : 3326 - 3330
- [36] Stream ciphers based on NLFSR [J]. ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 528 - 533
- [37] Stream ciphers: Dead or alive? [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 78 - 78
- [38] THE STABILITY THEORY OF STREAM CIPHERS [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 561 : R3 - +
- [40] Fault analysis of stream ciphers [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253