High order differential attacks on stream ciphers
From MaRDI portal
Publication:2376658
DOI10.1007/s12095-012-0071-9zbMath1285.94075OpenAlexW1965754682WikidataQ121338673 ScholiaQ121338673MaRDI QIDQ2376658
Publication date: 24 June 2013
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-012-0071-9
Related Items (6)
Analysis of variability and degree of non-linearity of HC-128 ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ Survey of information security ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Some cryptanalytic results on TRIAD ⋮ Counting and characterising functions with ``fast points for differential attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Self-testing/correcting with applications to numerical problems
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Breaking Grain-128 with Dynamic Cube Attacks
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Greedy Distinguishers and Nonrandomness Detectors
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Analysis of Grain’s Initialization Algorithm
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Resynchronization Attacks on WG and LEX
- Cube Attacks on Tweakable Black Box Polynomials
- How to Break MD5 and Other Hash Functions
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
This page was built for publication: High order differential attacks on stream ciphers