An overview of distinguishing attacks on stream ciphers (Q1032489): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: How Far Can We Go Beyond Linear Cryptanalysis? / rank
 
Normal rank
Property / cites work
 
Property / cites work: QUAD: A Practical Stream Cipher with Provable Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Unpredictable Pseudo-Random Number Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537991 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409140 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4023085 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413853 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two General Attacks on Pomaranch-Like Keystream Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Chosen IV Statistical Analysis of Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modern cryptography, probabilistic proofs and pseudo-randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341782 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279666 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484883 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046355 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Achterbahn-Version 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of an E0-like combiner with memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Attack on Broadcast RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940674 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046354 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank

Latest revision as of 02:51, 2 July 2024

scientific article
Language Label Description Also known as
English
An overview of distinguishing attacks on stream ciphers
scientific article

    Statements

    An overview of distinguishing attacks on stream ciphers (English)
    0 references
    0 references
    0 references
    0 references
    26 October 2009
    0 references
    0 references
    distinguishing attacks
    0 references
    stream ciphers
    0 references
    cryptography
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references