Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
From MaRDI portal
Publication:5458201
DOI10.1007/978-3-540-77026-8_6zbMATH Open1153.94430OpenAlexW1935491289MaRDI QIDQ5458201FDOQ5458201
Gautham Sekar, Bart Preneel, Souradyuti Paul
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_6
Recommendations
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Distinguishing Attacks on the Stream Cipher Py
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- Distinguishing Attack Against TPypy
Cites Work
- Title not available (Why is that?)
- How Far Can We Go Beyond Linear Cryptanalysis?
- Finding Collisions in the Full SHA-1
- How to Break MD5 and Other Hash Functions
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A Simple Related-Key Attack on the Full SHACAL-1
- Distinguishing Attacks on the Stream Cipher Py
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
- RC4-Hash: A New Hash Function Based on RC4
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Title not available (Why is that?)
- Distinguishing Attack Against TPypy
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Cited In (5)
- Distinguishing Attack Against TPypy
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
This page was built for publication: Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458201)