Cryptanalysis of the stream cipher LEX
From MaRDI portal
Publication:1949239
DOI10.1007/s10623-012-9612-7zbMath1296.94109WikidataQ122873285 ScholiaQ122873285MaRDI QIDQ1949239
Publication date: 6 May 2013
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-012-9612-7
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Low-Data Complexity Attacks on AES
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- A New Attack on the LEX Stream Cipher
- Automatic Search of Attacks on Round-Reduced AES and Applications
- Improved Time-Memory Trade-Offs with Multiple Data
- The Design of a Stream Cipher LEX