Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
24
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,524
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information and Communications Security
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
other
Author(s):
Wenling Wu
,
Lei Zhang
,
Liting Zhang
,
Wentao Zhang
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
24
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
Eli Biham
,
Alex Biryukov
,
Adi Shamir
(1999)
0
comments
Cited
56
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
New block encryption algorithm MISTY
Mitsuru Matsui
(1997)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Taizo Shirai
,
Kyoji Shibutani
,
Toru Akishita
…
(2007)
0
comments
Cited
42
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 17-31
DOI:
10.1007/978-3-642-11145-7_4
SO-VID:
91428f67-6ef4-4dbc-a3aa-c22f95c24887
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
How to Steal a Botnet and What Can Happen When You Do
pp. 2
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing
pp. 3
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
pp. 17
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
pp. 47
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
pp. 63
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems
pp. 80
Online/Offline Ring Signature Scheme
pp. 91
Policy-Controlled Signatures
pp. 107
Public Key Encryption without Random Oracle Made Truly Practical
pp. 121
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
pp. 135
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
pp. 150
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
pp. 165
Biometric-Based Non-transferable Anonymous Credentials
pp. 181
Secure Remote Execution of Sequential Computations
pp. 198
Architecture- and OS-Independent Binary-Level Dynamic Test Generation
pp. 211
Measuring Information Flow in Reactive Processes
pp. 226
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
pp. 241
Denial-of-Service Attacks on Host-Based Generic Unpackers
pp. 254
Predictive Pattern Matching for Scalable Network Intrusion Detection
pp. 268
Deterministic Finite Automata Characterization for Memory-Based Pattern Matching
pp. 283
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold
pp. 293
User-Assisted Host-Based Detection of Outbound Malware Traffic
pp. 308
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
pp. 325
Using the (Open) Solaris Service Management Facility as a Building Block for System Security
pp. 336
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program
pp. 346
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]
pp. 359
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining
pp. 370
GUC-Secure Join Operator in Distributed Relational Database
pp. 385
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics
pp. 396
Bring Efficient Connotation Expressible Policies to Trust Management
pp. 411
A User Trust-Based Collaborative Filtering Recommendation Algorithm
pp. 425
Fingerprinting Attack on the Tor Anonymity System
pp. 439
Proactive Verifiable Linear Integer Secret Sharing Scheme
pp. 449
A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach
pp. 459
Digital Audio Watermarking Technique Using Pseudo-Zernike Moments
pp. 474
An Image Sanitizing Scheme Using Digital Watermarking
pp. 483
Adaptive and Composable Oblivious Transfer Protocols (Short Paper)
pp. 493
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation
Similar content
5,524
A high performance ECC hardware implementation with instruction-level parallelism over GF(2163)
Authors:
Yu Zhang
,
Dongdong Chen
,
Younhee Choi
…
Potential Application of GF-6 WFV Data in Forest Types Monitoring
Authors:
J.Y. Liu
,
C.L. Xin
,
H.G. Wu
…
High performance asymmetric supercapacitor based on CoAl-LDH/GF and activated carbon from expanded graphite
Authors:
Tshifhiwa Masikhwa
,
Moshawe J. Madito
,
Damilola Y. Momodu
…
See all similar
Cited by
2
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
Authors:
Céline Blondeau
,
Andrey A. Bogdanov
,
Meiqin Wang
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
Authors:
Ruilin Li
,
Bing Sun
,
Chao Li
…
See all cited by