scientific article
From MaRDI portal
Publication:2707396
zbMath0980.94013MaRDI QIDQ2707396
Publication date: 3 July 2001
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (52)
Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers ⋮ FAN: a lightweight authenticated cryptographic algorithm ⋮ Another Look at Tightness ⋮ Comparison of perfect table cryptanalytic tradeoff algorithms ⋮ Certain Observations on ACORN v3 and the Implications to TMDTO Attacks ⋮ New second-preimage attacks on hash functions ⋮ Fast near collision attack on the Grain v1 stream cipher ⋮ An approach for stream ciphers design based on joint computing over random and secret data ⋮ CAR30: a new scalable stream cipher with rule 30 ⋮ Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 ⋮ The function-inversion problem: barriers and opportunities ⋮ A comparison of cryptanalytic tradeoff algorithms ⋮ Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem ⋮ Attacking Bivium Using SAT Solvers ⋮ Some results on lightweight stream ciphers Fountain v1 \& lizard ⋮ A New Algorithm for the Unbalanced Meet-in-the-Middle Problem ⋮ An ultrafast cryptographically secure pseudorandom number generator ⋮ Optimising Gröbner bases on Bivium ⋮ Quantum time/memory/data tradeoff attacks ⋮ The Stream Cipher HC-128 ⋮ Provable security against generic attacks on stream ciphers ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ Cryptanalysis of the stream cipher LEX ⋮ Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time ⋮ The cost of false alarms in Hellman and rainbow tradeoffs ⋮ Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function ⋮ Some results on Fruit ⋮ Loiss: A Byte-Oriented Stream Cipher ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Efficient deterministic and non-deterministic pseudorandom number generation ⋮ Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers ⋮ Practical construction and analysis of pseudo-randomness primitives ⋮ Optimal parameters for the WG stream cipher family ⋮ A New Attack on the LEX Stream Cipher ⋮ New Distinguishers Based on Random Mappings against Stream Ciphers ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack ⋮ Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU ⋮ Extended BDD-Based Cryptanalysis of Keystream Generators ⋮ Revisiting Correlation-Immunity in Filter Generators ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks ⋮ Instant ciphertext-only cryptanalysis of GSM encrypted communication ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ Analysis of the Parallel Distinguished Point Tradeoff ⋮ Analysis of the perfect table fuzzy rainbow tradeoff ⋮ A fast correlation attack on LILI-128 ⋮ A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
This page was built for publication: