Works matching DE "STREAM ciphers"
1
- International Journal of Wavelets, Multiresolution & Information Processing, 2018, v. 16, n. 1, p. -1, doi. 10.1142/S0219691318500066
- Liu, Longfei;
- Yang, Xiaoyuan;
- Wei, Bin;
- Wu, Liqiang
- Article
2
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 301, doi. 10.1049/ise2.12062
- Article
3
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 72, doi. 10.1049/iet-ifs.2018.5252
- Eskandari, Zahra;
- Ghaemi Bafghi, Abbas
- Article
4
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 559, doi. 10.1049/iet-ifs.2018.5233
- Hodžić, Samir;
- Pasalic, Enes;
- Wei, Yongzhuang
- Article
5
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 448, doi. 10.1049/iet-ifs.2018.5201
- Arabnezhad‐Khanoki, Hossein;
- Sadeghiyan, Babak;
- Pieprzyk, Josef
- Article
6
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 411, doi. 10.1049/iet-ifs.2018.5357
- Jiao, Lin;
- Hao, Yonglin;
- Li, Yongqiang
- Article
7
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 2, p. 141, doi. 10.1049/iet-ifs.2018.5180
- Article
8
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 1, p. 36, doi. 10.1049/iet-ifs.2017.0271
- Mihaljević, Miodrag J.;
- Oggier, Frédérique
- Article
9
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 484, doi. 10.1049/iet-ifs.2017.0553
- Jiao, Lin;
- Li, Yongqiang;
- Hao, Yonglin
- Article
10
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 5, p. 267, doi. 10.1049/iet-ifs.2016.0451
- Article
11
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 159, doi. 10.1049/iet-ifs.2016.0076
- Sahu, Harish Kumar;
- Gupta, Indivar;
- Pillai, N. Rajesh;
- Sharma, Rajendra Kumar
- Article
12
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 139, doi. 10.1049/iet-ifs.2016.0060
- Ma, Zhen;
- Tian, Tian;
- Qi, Wen‐Feng
- Article
13
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 46, doi. 10.1049/iet-ifs.2015.0427
- Ma, Zhen;
- Tian, Tian;
- Qi, Wen‐Feng
- Article
14
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 142, doi. 10.1049/iet-ifs.2015.0026
- Article
15
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 188, doi. 10.1049/iet-ifs.2012.0186
- Zadeh, Abdulah Abdulah;
- Heys, Howard M.
- Article
16
- Iraqi Journal for Computers & Informatics Ijci, 2018, v. 44, n. 2, p. 1, doi. 10.25195/2017/4422
- Mahdi, Mohammed Salih;
- Hassan, Nidaa Flaih
- Article
17
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 1, p. 243, doi. 10.21279/1454-864X-20-I1-033
- Medeleanu, Florin;
- Antonie, Narcis-Florentin;
- Răcuciu, Ciprian;
- Grecu, Dan Laurentiu;
- Antohi, Florin
- Article
18
- Photonics, 2023, v. 10, n. 2, p. 154, doi. 10.3390/photonics10020154
- Yang, Xiaokun;
- Wang, Xiangqing;
- Wang, Dongfei;
- Zhang, Lan;
- Yang, Zufang;
- Zhu, Han;
- Wu, Baohong
- Article
19
- Journal of Information Processing Systems, 2015, v. 11, n. 2, p. 310, doi. 10.3745/JIPS.02.0024
- Almazrooie, Mishal;
- Samsudin, Azman;
- Singh, Manmeet Mahinderjit
- Article
20
- International Journal of Circuit Theory & Applications, 2017, v. 45, n. 2, p. 188, doi. 10.1002/cta.2281
- Mora‐Gutiérrez, J. M.;
- Jiménez‐Fernández, C.J.;
- Valencia‐Barrero, M.
- Article
21
- Discrete Mathematics, Algorithms & Applications, 2023, v. 15, n. 6, p. 1, doi. 10.1142/S1793830922501464
- Article
22
- Studia Universitatis Babes-Bolyai, Informatica, 2010, p. 105
- Crainicu, Bogdan;
- Boian, Florian Mircea
- Article
23
- Studia Universitatis Babes-Bolyai, Informatica, 2010, v. 55, n. 1, p. 105
- Crainicu, Bogdan;
- Boian, Florian Mircea
- Article
24
- Studia Universitatis Babes-Bolyai, Informatica, 2010, v. 55, n. 2, p. 27
- Article
25
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2018, v. 29, n. 8, p. N.PAG, doi. 10.1142/S0129183118500742
- Zhong, Jin;
- Jiang, Dong;
- Huang, Qi-Guo;
- Cao, Yang
- Article
26
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2014, v. 25, n. 4, p. -1, doi. 10.1142/S0129183113501052
- García-Martínez, M.;
- Campos-Cantón, E.
- Article
27
- International Journal of Foundations of Computer Science, 2024, v. 35, n. 3, p. 245, doi. 10.1142/S0129054123500016
- Article
28
- International Journal of Foundations of Computer Science, 2020, v. 31, n. 3, p. 301, doi. 10.1142/S0129054120500094
- Wang, Zhongxiao;
- Wang, Xiangyu;
- Tian, Tian
- Article
29
- EURASIP Journal on Image & Video Processing, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13640-020-00502-w
- Yu, Mingji;
- Liu, Yuchen;
- Sun, Hu;
- Yao, Heng;
- Qiao, Tong
- Article
30
- Journal of Research & Practice in Information Technology, 2009, v. 41, n. 2, p. 181
- Caballero-Gil, Pino;
- Fúster-Sabater, Amparo;
- Pazo-Robles, M. Eugenia
- Article
31
- Journal of Cryptology, 2020, v. 33, n. 3, p. 874, doi. 10.1007/s00145-019-09332-0
- Article
32
- Journal of Cryptology, 2018, v. 31, n. 3, p. 885, doi. 10.1007/s00145-017-9273-9
- Canteaut, Anne;
- Carpov, Sergiu;
- Fontaine, Caroline;
- Lepoint, Tancrède;
- Naya-Plasencia, María;
- Paillier, Pascal;
- Sirdey, Renaud
- Article
33
- Journal of Cryptology, 2014, v. 27, n. 1, p. 67, doi. 10.1007/s00145-012-9138-1
- Sen Gupta, Sourav;
- Maitra, Subhamoy;
- Paul, Goutam;
- Sarkar, Santanu
- Article
34
- Journal of Cryptology, 2014, v. 27, n. 1, p. 1, doi. 10.1007/s00145-012-9130-9
- Stankovski, Paul;
- Hell, Martin;
- Johansson, Thomas
- Article
35
- Journal of Cryptology, 2011, v. 24, n. 3, p. 427, doi. 10.1007/s00145-009-9053-2
- Hell, Martin;
- Johansson, Thomas
- Article
36
- General Letters in Mathematics (GLM), 2021, v. 10, n. 2, p. 46
- Jebrane, Jihane;
- Lazaar, Saiida
- Article
37
- Iraqi Journal of Science, 2024, v. 65, n. 5, p. 2619, doi. 10.24996/ijs.2024.65.5.22
- Abed, Shahad Sameer;
- Nasir, Ayad Ghazi
- Article
38
- Iraqi Journal of Science, 2024, v. 65, n. 1, p. 346, doi. 10.24996/ijs.2024.65.1.28
- Ali, Adnan Muhammad;
- Ali, Faez Hassan;
- Redha, Sabah Manfi
- Article
39
- Iraqi Journal of Science, 2023, v. 64, n. 5, p. 2589, doi. 10.24996/ijs.2023.64.5.40
- Abdul-Jabbar, Safa S.;
- Abed, Abeer E.;
- Mohammed, Sajaa G.;
- Mohammed, Faisel G.
- Article
40
- Iraqi Journal of Science, 2022, v. 63, n. 12, p. 4547, doi. 10.24996/ijs.2022.63.10.37
- Article
41
- Iraqi Journal of Science, 2022, v. 63, n. 10, p. 4547, doi. 10.24996/ijs.2022.63.10.37
- Article
42
- Iraqi Journal of Science, 2019, v. 60, n. 10, p. 2229, doi. 10.24996/ijs.2019.60.10.17
- Alsaadi, Ahmed Amer;
- Al-Shammari, Ayad G. Naser
- Article
43
- Iraqi Journal of Science, 2018, v. 59, n. 3B, p. 1490, doi. 10.24996/ijs.2018.59.3B.15
- Mithaq Abdulkareem Abdulwahed;
- Ayad G. Naser Al-Shammari
- Article
44
- Iraqi Journal of Science, 2018, v. 59, n. 2C, p. 1105, doi. 10.24996/ijs.2018.59.2C.15
- Abdullah Ayad Ghazi;
- Faez Hassan Ali
- Article
45
- Optimization Methods & Software, 2021, v. 36, n. 4, p. 672, doi. 10.1080/10556788.2019.1685993
- Zaikin, O. S.;
- Kochemazov, S. E.
- Article
46
- Journal of Qadisiyah Computer Science & Mathematics, 2023, v. 15, n. 4, p. 28, doi. 10.29304/jqcsm.2023.15.41348
- Razzaq al-Mahmood, Haider Hameed;
- Alsaad, Saad N.
- Article
47
- Journal of Qadisiyah Computer Science & Mathematics, 2019, v. 11, n. 1, p. 27, doi. 10.29304/jqcm.2019.11.1.464
- Abd Zaid, Mustafa M.;
- Hassan, Soukaena
- Article
48
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 3, p. 91, doi. 10.29304/jqcm.2018.10.3.441
- Mahdi, Mohammed Salih;
- Hassan, Nidaa Flaih
- Article
49
- Malaysian Journal of Mathematical Sciences, 2015, v. 9, p. 139
- Liren Ding;
- Yongjuan Wang;
- Zhufeng Li
- Article
50
- Computer Journal, 2019, v. 62, n. 12, p. 1793, doi. 10.1093/comjnl/bxz057
- Zhong, Jianghua;
- Lin, Dongdai
- Article