On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
From MaRDI portal
Publication:5459070
DOI10.1007/11935230_5zbMath1172.94595OpenAlexW1640978376MaRDI QIDQ5459070
Publication date: 24 April 2008
Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11935230_5
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items
On the structural weakness of the GGHN stream cipher, Further non-randomness in RC4, RC4A and VMPC, Cryptanalysis of the Full Spritz Stream Cipher, Distinguishing attacks on stream ciphers based on arrays of pseudo-random words, Distinguishing Attack Against TPypy, Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, A new distinguishing and key recovery attack on NGG stream cipher, On the Evolution of GGHN Cipher, New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B