从未沮丧 发表于 2025-3-21 16:26:10
书目名称New Stream Cipher Designs影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0665776<br><br> <br><br>书目名称New Stream Cipher Designs读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0665776<br><br> <br><br>macular-edema 发表于 2025-3-21 23:16:58
http://reply.papertrans.cn/67/6658/665776/665776_2.png有恶意 发表于 2025-3-22 01:25:20
ASIC Hardware Performance,z RFID. Where applicable to a particular cipher, guidance on any limitations on the choice of key or IV is given. The chapter concludes with a summary of the performance of each of the candidates and some general guidance for future low resource hardware stream cipher development.原始 发表于 2025-3-22 08:30:53
Book 2008ence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposalsBLAZE 发表于 2025-3-22 10:58:16
D,,,f .. combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed by an irregular decimation mechanism called the ABSG. Since designers have been invited to demonstrate flexibility of their design by proposing variants that take 128-bit keys, we also present a 128-bit security version of . called .-128.裂缝 发表于 2025-3-22 15:55:34
http://reply.papertrans.cn/67/6658/665776/665776_6.pngconformity 发表于 2025-3-22 18:44:07
http://reply.papertrans.cn/67/6658/665776/665776_7.png确认 发表于 2025-3-22 22:43:07
The Stream Cipher Edon80,entation on popular modern CPUs can be made as slow as needed. Since its first description in 2005, it has been analyzed by several cryptographers, have been implemented in a more compact way and a MAC functionality have been added. We give a full description of Edon80 including latest developments and updates.急性 发表于 2025-3-23 04:32:18
http://reply.papertrans.cn/67/6658/665776/665776_9.pngmisshapen 发表于 2025-3-23 06:46:04
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues, to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 2. bit maximum permitted keystream length for a single key-IV pair.