1 |
M. Boesgaard, M. Vesterager, T. Christensen, E. Zenner, "The Stream Cipher Rabbit," http://www.ecrypt.eu.org/stream/e2-rabbit.html
|
2 |
Z. Shi, B. Zhang, D. Feng and W. Wu, "Improved Key Recovery Attacks on Reduced Round Salsa20 and ChaCha," ICISC 2012, LNCS vol 7839, pp. 337-351, 2012.
|
3 |
P. Hawkes and G. Rose, "Correlation cryptanalysis of SSC2," Presented at the Rump Session of CRYPTO, 2000.
|
4 |
N. Courtois, "Fast Algebraic Attack on Stream Ciphers with Linear Feedback," Advances in Cryptology-CRYPTO 2003, LNCS vol. 2729, pp. 176-194, 2003.
|
5 |
D. J. Bernstein, "Salsa20 - Design, Specification, Security and Speed," http://www.ecrypt.eu.org/stream/e2-salsa20.html
|
6 |
C. S. Park and G. Y. Cho, "Generalization of Galois Linear Feedback Register," Institute of Electronics Engineers of Korea, vol. 43, C1, no. 1, Jan. 2006.
과학기술학회마을
|
7 |
H. Wu, "Stream Cipher HC-128," http://www.ecrypt.eu.org/stream/e2-hc128.html
|
8 |
C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, "Sosemanuk, a fast softwareoriented stream cipher," http://www.ecrypt.eu.org/stream/e2-sosemanuk.html
|
9 |
M. Hell, T. Johansson and W. Meier, "A Stream Cipher Proposal: Grain-128," http://www.ecrypt.eu.org/stream/e2-grain.html
|
10 |
S. Babbage and M. Dodd, "The stream cipher MICKEY 2.0," http://www.ecrypt.eu.org/stream/e2-mickey.html
|
11 |
C. De Canniere and B. Preneel, "Trivium-Specifications," http://www.ecrypt.eu.org/stream/e2-trivium.html
|
12 |
C. De Canniere, "eSTREAM Software Performance," LNCS vol. 4986, pp. 119-139, 2008.
|
13 |
P. Souradyuti and B. Preneel, "Analysis of Non-fortuitous RC4 key stream generator," Progress in Crytology-INDOCRYPT, 2003.
|
14 |
E. Zenner, "Why IV Setup for Stream Cipher is Difficult," Proceedings of Dagstuhl Seminar on Symmetric Cryptography, 2007.
|
15 |
G.H. Kim and G.Y. Cho, "Design and Implementation of Stream Cipher based on SHACAL-2 Superior in the Confidentiality and Integrity," JKMMS. vol.16, no.12, pp.101-112, 2013.
과학기술학회마을
DOI
|
16 |
FIPS PUB 197, "Advanced Encryption Standard(AES)," NIST, 2001.
|
17 |
G.H. Kim, G.Y. Cho, K.H. Lee and S.U Shin, "Implementation of fast stream cipher AA128 suitable for real time processing applications," J. Korea Inst. Inf. Commun. Eng. vol. 16, no.10, pp.2207-2216, 2012.
과학기술학회마을
DOI
|
18 |
P. Hawkes and G. Rose, "Guess-and-determine attacks on SNOW," In Selected Areas in Cryptography - SAC 2002, LNCS vol. 2595, pp. 37-46, 2002.
|
19 |
Y. Tsunoo, T. Saito, H. Kubo, T. Suzaki, and H. Nakashima, "Differential cryptanalysis of Salsa20/8," In SASC 2007, eSTREAM report 2007/010, 2007.
|
20 |
D. J. Bernstein and P. Schwabe, "New AES Software Speed Records," INDOCRYPT 2008, LNCS vol. 5365, pp. 322-336, 2008.
|
21 |
http://www.ecrypt.eu.org/stream/
|
22 |
http://www.ecrypt.eu.org/stream/phase3list.html
|
23 |
J. C. H. Castro, J. M. Estvez-Tapiador and J. J. Quisquater, "On the salsa20 core function," LNCS vol. 5086, pp. 462-469, 2008.
|