scientific article

From MaRDI portal
Publication:2707396

zbMath0980.94013MaRDI QIDQ2707396

Adi Shamir, Alex Biryukov

Publication date: 3 July 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (52)

Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphersFAN: a lightweight authenticated cryptographic algorithmAnother Look at TightnessComparison of perfect table cryptanalytic tradeoff algorithmsCertain Observations on ACORN v3 and the Implications to TMDTO AttacksNew second-preimage attacks on hash functionsFast near collision attack on the Grain v1 stream cipherAn approach for stream ciphers design based on joint computing over random and secret dataCAR30: a new scalable stream cipher with rule 30Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2The function-inversion problem: barriers and opportunitiesA comparison of cryptanalytic tradeoff algorithmsWeaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream CipherStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionNear Collision Attack on the Grain v1 Stream CipherCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemAttacking Bivium Using SAT SolversSome results on lightweight stream ciphers Fountain v1 \& lizardA New Algorithm for the Unbalanced Meet-in-the-Middle ProblemAn ultrafast cryptographically secure pseudorandom number generatorOptimising Gröbner bases on BiviumQuantum time/memory/data tradeoff attacksThe Stream Cipher HC-128Provable security against generic attacks on stream ciphersGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128Cryptanalysis of the stream cipher LEXBreaking the stream ciphers F-FCSR-H and F-FCSR-16 in real timeThe cost of false alarms in Hellman and rainbow tradeoffsInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean functionSome results on FruitLoiss: A Byte-Oriented Stream CipherStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionEspresso: a stream cipher for 5G wireless communication systemsDesign and analysis of small-state grain-like stream ciphersOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksEfficient deterministic and non-deterministic pseudorandom number generationTreatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphersPractical construction and analysis of pseudo-randomness primitivesOptimal parameters for the WG stream cipher familyA New Attack on the LEX Stream CipherNew Distinguishers Based on Random Mappings against Stream CiphersInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackTime–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPUExtended BDD-Based Cryptanalysis of Keystream GeneratorsRevisiting Correlation-Immunity in Filter GeneratorsPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksInstant ciphertext-only cryptanalysis of GSM encrypted communicationPractical Algebraic Attacks on the Hitag2 Stream CipherAnalysis of the Parallel Distinguished Point TradeoffAnalysis of the perfect table fuzzy rainbow tradeoffA fast correlation attack on LILI-128A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a




This page was built for publication: