BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
block (6)
base (4)
stream (3)
model (3)
implement (2)

Stem cipher$ (all stems)

12 papers:

DACDAC-2015-BeaulieuSSTWW #lightweight
The SIMON and SPECK lightweight block ciphers (RB, DS, JS, STC, BW, LW), p. 6.
DATEDATE-2015-JovanovicP #product line
Fault-based attacks on the Bel-T block cipher family (PJ, IP), pp. 601–604.
ITiCSEITiCSE-2015-LiMTMSKW #named #visualisation
VIGvisual: A Visualization Tool for the Vigenère Cipher (CL, JM, JT, JM, CKS, MSK, CW), pp. 129–134.
DACDAC-2014-RudraDNH #case study #design #logic
Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study (MRR, NAD, VN, DHKH), p. 4.
DACDAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
STOCSTOC-2011-HolensteinKT #equivalence #random #revisited
The equivalence of the random oracle model and the ideal cipher model, revisited (TH, RK, ST), pp. 89–98.
ECMFAECMFA-2010-Balderas-ContrerasGC #algorithm #uml
A UML 2.0 Profile to Model Block Cipher Algorithms (TBC, GRG, RC), pp. 20–31.
DATEDATE-2009-Dubrova #how
How to speed-up your NLFSR-based stream cipher (ED), pp. 878–881.
DATEDATE-2009-HenzenCFF #evaluation #hardware
Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT (LH, FC, NF, WF), pp. 646–651.
DATEDATE-2007-GrossschadlTRHM #constraints #energy #evaluation #implementation #memory management
Energy evaluation of software implementations of block ciphers under memory constraints (JG, ST, CR, MH, MM), pp. 1110–1115.
SACSAC-2007-KimHC #implementation #mobile #multi #performance
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices (HK, JH, SC), pp. 1171–1175.
DACDAC-2001-KarriWMK #concurrent #detection #fault #symmetry
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers (RK, KW, PM, YK), pp. 579–585.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.