Distinguishing Attack Against TPypy
From MaRDI portal
Publication:5452275
DOI10.1007/978-3-540-77360-3_25zbMATH Open1154.94435OpenAlexW1515197160MaRDI QIDQ5452275FDOQ5452275
Authors: Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_25
Recommendations
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Distinguishing Attacks on the Stream Cipher Py
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Cites Work
- Title not available (Why is that?)
- How Far Can We Go Beyond Linear Cryptanalysis?
- Distinguishing Attacks on the Stream Cipher Py
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Cited In (5)
- Distinguishing Attacks on the Stream Cipher Py
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
This page was built for publication: Distinguishing Attack Against TPypy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452275)