Distinguishing Attack Against TPypy
From MaRDI portal
Publication:5452275
Recommendations
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Distinguishing Attacks on the Stream Cipher Py
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Cites work
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- Distinguishing Attacks on the Stream Cipher Py
- How Far Can We Go Beyond Linear Cryptanalysis?
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Cited in
(5)- Distinguishing Attacks on the Stream Cipher Py
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
This page was built for publication: Distinguishing Attack Against TPypy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452275)