On the structural weakness of the GGHN stream cipher
From MaRDI portal
Publication:2380845
DOI10.1007/s12095-009-0013-3zbMath1192.94101OpenAlexW2130959496WikidataQ122919475 ScholiaQ122919475MaRDI QIDQ2380845
Amr M. Youssef, Aleksandar Kircanski
Publication date: 12 April 2010
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-009-0013-3
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Practical Attack on Broadcast RC4
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Applied Cryptography and Network Security
- Passive–Only Key Recovery Attacks on RC4
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Fast Software Encryption
- Fast Software Encryption
- Uniform Random Number Generators
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
This page was built for publication: On the structural weakness of the GGHN stream cipher