Distinguishing Attack Against TPypy
From MaRDI portal
Publication:5452275
DOI10.1007/978-3-540-77360-3_25zbMath1154.94435OpenAlexW1515197160MaRDI QIDQ5452275
Yukiyasu Tsunoo, Takeshi Kawabata, Teruo Saito, Hiroki Nakashima
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_25
Related Items (2)
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Cites Work
- Unnamed Item
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Distinguishing Attacks on the Stream Cipher Py
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- How Far Can We Go Beyond Linear Cryptanalysis?
This page was built for publication: Distinguishing Attack Against TPypy