Cryptanalysis of the stream cipher LEX
From MaRDI portal
Publication:1949239
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- A New Attack on the LEX Stream Cipher
- Automatic search of attacks on round-reduced AES and applications
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Improved Time-Memory Trade-Offs with Multiple Data
- Improved single-key attacks on 8-round AES-192 and AES-256
- Low-Data Complexity Attacks on AES
- The Design of a Stream Cipher LEX
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
Cited in
(6)
This page was built for publication: Cryptanalysis of the stream cipher LEX
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1949239)