On the structural weakness of the GGHN stream cipher
From MaRDI portal
(Redirected from Publication:2380845)
Recommendations
Cites work
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1149908 (Why is no real title available?)
- scientific article; zbMATH DE number 1942428 (Why is no real title available?)
- scientific article; zbMATH DE number 1979271 (Why is no real title available?)
- scientific article; zbMATH DE number 1759259 (Why is no real title available?)
- scientific article; zbMATH DE number 2085191 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Practical Attack on Broadcast RC4
- Analysis Methods for (Alleged) RC4
- Applied Cryptography and Network Security
- Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
- New State Recovery Attack on RC4
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Passive–Only Key Recovery Attacks on RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Uniform Random Number Generators
Cited in
(2)
This page was built for publication: On the structural weakness of the GGHN stream cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2380845)