Cryptanalysis of the stream cipher LEX
From MaRDI portal
Publication:1949239
DOI10.1007/S10623-012-9612-7zbMATH Open1296.94109OpenAlexW2032777323WikidataQ122873285 ScholiaQ122873285MaRDI QIDQ1949239FDOQ1949239
Authors: Orr Dunkelman, Nathan Keller
Publication date: 6 May 2013
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-012-9612-7
Recommendations
Cites Work
- The Design of a Stream Cipher LEX
- Title not available (Why is that?)
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved single-key attacks on 8-round AES-192 and AES-256
- Title not available (Why is that?)
- Automatic search of attacks on round-reduced AES and applications
- Low-Data Complexity Attacks on AES
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- A New Attack on the LEX Stream Cipher
- Improved Time-Memory Trade-Offs with Multiple Data
Cited In (6)
Uses Software
This page was built for publication: Cryptanalysis of the stream cipher LEX
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1949239)