A New Attack on the LEX Stream Cipher
From MaRDI portal
Publication:3600396
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Improved Time-Memory Trade-Offs with Multiple Data
- The Design of a Stream Cipher LEX
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
Cited in
(10)- Differential-Linear Attacks Against the Stream Cipher Phelix
- Meet-in-the-middle attacks on 10-round AES-256
- New representations of the AES key schedule
- The Design of a Stream Cipher LEX
- Cryptanalysis of the stream cipher LEX
- Improved single-key attacks on 8-round AES-192 and AES-256
- Resynchronization Attacks on WG and LEX
- New representations of the AES key schedule
- ASC-1: an authenticated encryption stream cipher
- Cryptanalysis of helix and phelix revisited
This page was built for publication: A New Attack on the LEX Stream Cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600396)