Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,097,442 papers from all fields of science
Search
Sign In
Create Free Account
DECIM
In cryptography, DECIM is a stream cypher algorithm designed by Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Algorithm
Cryptography
ECRYPT
ESTREAM
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers
Darshana Upadhya
,
S. Gandhi
2017
Corpus ID: 195930957
In 21st Century, Data Security is achieved through Cryptographically secure Pseudo Random Number Generators (CSPRNG). Hence, all…
Expand
2012
2012
Un acercamiento a la representación de nación a través de la discursividad científica decimonónica argentina
M. A. Brá
2012
Corpus ID: 191330965
Resumen es: Esta investigacion se propone aproximarse a la construccion del significado la nacion a traves de la produccion…
Expand
2011
2011
Secured Initialization of Dynamic Message Authentication in Wireless Devices
D. Raghu
,
R. Krishna
,
Raja Jacub
2011
Corpus ID: 18814032
There are several protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless…
Expand
2011
2011
Correlation power analysis of DECIMv2
Yanyan Jia
,
Hu Yupu
,
Yongbin Zhao
,
Juntao Gao
2011
Corpus ID: 58221411
2011
2011
Comparative Study of DECIM-128 and DECIMV 2 in relation to Compact Hash-based Message Authentication Code
VENKATESWARA RAO PEDDADA
,
K. Devi
,
C. V. Krishna
2011
Corpus ID: 17241906
constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in…
Expand
2008
2008
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Hidehiko Nakagami
,
Ryoichi Teramura
,
T. Ohigashi
,
H. Kuwakado
,
M. Morii
IACR Cryptology ePrint Archive
2008
Corpus ID: 5066352
DECIM v2 is a stream cipher submitted to the ECRYPT stream cipher project (eSTREAM) and ISO/IEC 18033-4. No attack against DECIM…
Expand
2008
2008
Author Manuscript, Published in "new Stream Cipher Designs -the Estream Finalists
C. Berbain
,
O. Billet
,
+10 authors
H. Sibert
2008
Corpus ID: 17902079
In this paper, we present Decim, a stream cipher hardwareoriented selected for the phase 3 of the ECRYPT stream cipher project…
Expand
2007
2007
Side Channel Attacks on Irregularly Decimated Generators
Chuan-Wen Loe
,
Khoongming Khoo
International Conference on Information Security…
2007
Corpus ID: 15103793
We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are…
Expand
2006
2006
Detailed Statistical Analysis of Synchronous Stream Ciphers
Meltem Sönmez Turan
,
A. Doganaksoy
,
Çağdaş Çalık
2006
Corpus ID: 12423537
The output of synchronous stream ciphers should be indistinguishable from truly random sequences and should not leak any…
Expand
2006
2006
DECIM−128 ∗
C. Berbain
,
O. Billet
,
+10 authors
H. Sibert
2006
Corpus ID: 16349511
Decim is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. The design of Decim is based on both a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE