A New Attack on the LEX Stream Cipher
From MaRDI portal
Publication:3600396
DOI10.1007/978-3-540-89255-7_33zbMATH Open1206.94065OpenAlexW1486445495MaRDI QIDQ3600396FDOQ3600396
Authors: Orr Dunkelman, Nathan Keller
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_33
Recommendations
Cites Work
- The Design of a Stream Cipher LEX
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Improved Time-Memory Trade-Offs with Multiple Data
Cited In (10)
- Differential-Linear Attacks Against the Stream Cipher Phelix
- Meet-in-the-middle attacks on 10-round AES-256
- New representations of the AES key schedule
- The Design of a Stream Cipher LEX
- Cryptanalysis of the stream cipher LEX
- Improved single-key attacks on 8-round AES-192 and AES-256
- Resynchronization Attacks on WG and LEX
- New representations of the AES key schedule
- ASC-1: an authenticated encryption stream cipher
- Cryptanalysis of helix and phelix revisited
Uses Software
This page was built for publication: A New Attack on the LEX Stream Cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600396)