An overview of distinguishing attacks on stream ciphers (Q1032489): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: NIST Statistical Test Suite / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Diehard / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: eSTREAM / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-008-0006-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2064678865 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How Far Can We Go Beyond Linear Cryptanalysis? / rank
 
Normal rank
Property / cites work
 
Property / cites work: QUAD: A Practical Stream Cipher with Provable Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Unpredictable Pseudo-Random Number Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537991 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409140 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4023085 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413853 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two General Attacks on Pomaranch-Like Keystream Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Chosen IV Statistical Analysis of Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modern cryptography, probabilistic proofs and pseudo-randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341782 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279666 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484883 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046355 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Achterbahn-Version 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of an E0-like combiner with memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Attack on Broadcast RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940674 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046354 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank

Latest revision as of 02:51, 2 July 2024

scientific article
Language Label Description Also known as
English
An overview of distinguishing attacks on stream ciphers
scientific article

    Statements

    An overview of distinguishing attacks on stream ciphers (English)
    0 references
    0 references
    0 references
    0 references
    26 October 2009
    0 references
    0 references
    distinguishing attacks
    0 references
    stream ciphers
    0 references
    cryptography
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references