Cited By
View all- Zidarič NMandal KGong GAagaard M(2024)The welch-gong stream cipher - evolutionary pathCryptography and Communications10.1007/s12095-023-00656-016:1(129-165)Online publication date: 1-Jan-2024
- Das BDas AChowdhury D(2023)Security Analysis of WAGE Against Division Property Based Cube AttackInformation Security Practice and Experience10.1007/978-981-99-7032-2_29(492-506)Online publication date: 24-Aug-2023
- Wang WWang HTang D(2023)An Improved Method for Evaluating Secret Variables and Its Application to WAGEInformation Security and Cryptology10.1007/978-981-97-0942-7_18(360-378)Online publication date: 9-Dec-2023
- Show More Cited By