An efficient state recovery attack on the X-FCSR family of stream ciphers
From MaRDI portal
Publication:2442642
DOI10.1007/s00145-012-9130-9zbMath1350.94051OpenAlexW2083225866WikidataQ62041901 ScholiaQ62041901MaRDI QIDQ2442642
Paul Stankovski, Thomas Johansson, Martin Hell
Publication date: 1 April 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://lup.lub.lu.se/record/2701872
Related Items (1)
Uses Software
Cites Work
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Feedback shift registers, 2-adic span, and combiners with memory
- An Efficient State Recovery Attack on X-FCSR-256
- Breaking the F-FCSR-H Stream Cipher in Real Time
- A New Approach for FCSRs
- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode
- 2-Adic shift registers
- Cuckoo hashing
- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
- Fast Software Encryption
This page was built for publication: An efficient state recovery attack on the X-FCSR family of stream ciphers