Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

CRYPTREC

Known as: Cryptography Research and Evaluation Committees 
CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize… Expand
  • figure 6
  • figure 9
Is this relevant?
2008
2008
In order to connect the block cipher into stream cipher mode, the middleware about output of the block cipher was designed… Expand
Is this relevant?
2004
2004
  • B. Roy, W. Meier
  • Lecture Notes in Computer Science
  • 2004
  • Corpus ID: 13166875
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n bit i of the output can depend only on bits… Expand
  • figure 7
  • figure 8
  • figure 9
  • figure 10
  • figure 11
Is this relevant?
2004
2004
The linearly updated component of the stream cipher MUGI, called the buffer, is analyzed theoretically by using the generating… Expand
  • figure 1
Is this relevant?
2004
2004
ne of the characteristics of the economies in transition from communism has been the creation of antimonopoly committees (AMCs… Expand
Is this relevant?
2003
2003
  • J. Stern
  • EUROCRYPT
  • 2003
  • Corpus ID: 16381679
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security… Expand
Is this relevant?
2002
2002
  • B. Preneel
  • Public Key Cryptography
  • 2002
  • Corpus ID: 1521343
In February 2000 the NESSIE project has launched an open call for the next generation of cryptographic algorithms. These… Expand
Is this relevant?
2002
2002
In spite of more than 25 years of open research on crypto- graphic algorithms, many applications still use insecure cryptography… Expand
Is this relevant?
2000
2000
We will describe the outline of the cryptographic technology evaluation project in Japan and those present conditions. The… Expand
Is this relevant?