A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
From MaRDI portal
Publication:352050
DOI10.1007/S11704-011-9158-2zbMATH Open1267.94105OpenAlexW2038063983WikidataQ123343998 ScholiaQ123343998MaRDI QIDQ352050FDOQ352050
Authors: Wenfeng Yang, Yupu Hu
Publication date: 4 July 2013
Published in: Frontiers of Computer Science in China (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11704-011-9158-2
Recommendations
Cites Work
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Cube Attacks on Tweakable Black Box Polynomials
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Title not available (Why is that?)
- Maiorana–McFarland Class: Degree Optimization and Algebraic Properties
- Title not available (Why is that?)
- Title not available (Why is that?)
- On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers
- Selected Areas in Cryptography
- Selected Areas in Cryptography
- On the resynchronization attack.
Cited In (2)
This page was built for publication: A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q352050)