Cryptanalysis of WG Family of Stream Ciphers (English)
- New search for: Lin Ding
- New search for: Lin Ding
- New search for: Chenhui Jin
- New search for: Jie Guan
- New search for: Shaowu Zhang
- New search for: Ting Cui
- New search for: Dong Han
- New search for: Wei Zhao
In:
The computer journal
;
58
, 10
; 2677
;
2015
-
ISSN:
- Article (Journal) / Print
-
Title:Cryptanalysis of WG Family of Stream Ciphers
-
Contributors:
-
Published in:The computer journal ; 58, 10 ; 2677
-
Publisher:
- New search for: Oxford Univ. Press
-
Place of publication:Oxford
-
Publication date:2015
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.00
- Further information on Basic classification
- New search for: 275/3155
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 58, Issue 10
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2193
-
Special Issue on Secure Information Systems EngineeringRosado, D. G. / Lammari, N. / Jürjens, J. et al. | 2015
- 2195
-
Privacy-Preserving Query Processing by Multi-Party ComputationSepehri, M. / Cimato, S. / Damiani, E. et al. | 2015
- 2213
-
Privacy as an Integral Part of the Implementation of Cloud SolutionsEvangelia Kavakli et al. | 2015
- 2225
-
A Trust Evaluation Model for Cloud Computing Using Service Level AgreementD Marudhadevi et al. | 2015
- 2233
-
ISGcloud: a Security Governance Framework for Cloud ComputingOscar Rebollo et al. | 2015
- 2255
-
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAsThomas Quirchmayr et al. | 2015
- 2280
-
The Robust Measurement Method for Security Metrics GenerationKatarzyna Mazur et al. | 2015
- 2297
-
Reference Ontology for Cybersecurity Operational InformationTakeshi Takahashi et al. | 2015
- 2313
-
Modelling Security of Critical Infrastructures: A Survivability AssessmentRicardo J Rodríguez et al. | 2015
- 2328
-
An Integrated Security and Systems Engineering Process and Modelling FrameworkJose Fran Ruiz et al. | 2015
- 2351
-
Modernizing Secure OLAP Applications with a Model-Driven ApproachCarlos Blanco et al. | 2015
- 2368
-
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic AlgorithmsKazim Yumbul et al. | 2015
- 2388
-
Trust Enhanced Security for Tenant Transactions in the Cloud EnvironmentTupakula, U. / Varadharajan, V. et al. | 2015
- 2404
-
CHURNs: Freshness Assurance for HumansKenneth Radke et al. | 2015
- 2426
-
Generalized Random Grid-Based Visual Secret Sharing for General Access StructuresChunfeng Lian et al. | 2015
- 2443
-
Hardware Accelerator to Detect Multi-Segment Virus PatternsXing Wang et al. | 2015
- 2461
-
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular EnvironmentsChanying Huang et al. | 2015
- 2476
-
Malicious Nodes Identification for Complex Network Based on Local ViewsGrazielle Vernize et al. | 2015
- 2492
-
Forward-Secure Threshold Attribute-Based Signature SchemeJianghong Wei et al. | 2015
- 2507
-
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard ModelDebiao He et al. | 2015
- 2509
-
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group AuthorityChang Xu et al. | 2015
- 2520
-
Fully Secure Wicked Identity-Based Encryption Against Key Leakage AttacksShi-Feng Sun et al. | 2015
- 2537
-
FEIPS: A Secure Fair-Exchange Payment System for Internet TransactionsZoran Djuric et al. | 2015
- 2557
-
Password Management: Distribution, Review and RevocationLanfranco Lopriore et al. | 2015
- 2567
-
Modelling and Quantitative Verification of Reputation Systems Against Malicious AttackersAmir Jalaly Bidgoly et al. | 2015
- 2583
-
Reversible Steganographic Method Using Complexity Control and Human Visual SystemWien Hong et al. | 2015
- 2595
-
Trusted Validation for Geolocation of Cloud DataDong Lai Fu et al. | 2015
- 2608
-
Annotated Control Flow Graph for Metamorphic Malware DetectionShahid Alam et al. | 2015
- 2622
-
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition CapabilityMd Saiful Islam et al. | 2015
- 2636
-
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear PairingsSK Hafizul Islam et al. | 2015
- 2649
-
On Designing Resilient Location-Privacy ObfuscatorsPericle Perazzo et al. | 2015
- 2665
-
Revisiting Security Against the Arbitrator in Optimistic Fair ExchangeYang Wang et al. | 2015
- 2677
-
Cryptanalysis of WG Family of Stream CiphersLin Ding et al. | 2015
- 2686
-
PKE-AET: Public Key Encryption with Authorized Equality TestKaibin Huang et al. | 2015
- 2698
-
Revocable Group Signature with Constant-Size Revocation ListNuttapong Attrapadung et al. | 2015
- 2716
-
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AESErkay Savas et al. | 2015
- 2738
-
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH AssumptionsMayana Pereira et al. | 2015
- 2747
-
Generic Construction of Certificate-Based Encryption from Certificateless Encryption RevisitedWei Gao et al. | 2015
- 2758
-
Toward a Taxonomy of Malware BehaviorsGrégio, A. R. / Afonso, V. M. / Filho, D. S. / Geus, P. L. / Jino, M. et al. | 2015
- 2778
-
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based EncryptionLiang, K. / Susilo, W. / Liu, J. K. / Wong, D. S. et al. | 2015