On the structural weakness of the GGHN stream cipher
From MaRDI portal
Publication:2380845
DOI10.1007/S12095-009-0013-3zbMATH Open1192.94101OpenAlexW2130959496WikidataQ122919475 ScholiaQ122919475MaRDI QIDQ2380845FDOQ2380845
Authors: Aleksandar Kircanski, A. M. Youssef
Publication date: 12 April 2010
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-009-0013-3
Recommendations
Cites Work
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Practical Attack on Broadcast RC4
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Title not available (Why is that?)
- Title not available (Why is that?)
- New State Recovery Attack on RC4
- Fast Software Encryption
- Fast Software Encryption
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
- Uniform Random Number Generators
- Analysis Methods for (Alleged) RC4
- Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher
- Passive–Only Key Recovery Attacks on RC4
Cited In (2)
This page was built for publication: On the structural weakness of the GGHN stream cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2380845)