A Framework for Chosen IV Statistical Analysis of Stream Ciphers
From MaRDI portal
Publication:5458215
Recommendations
Cites work
Cited in
(20)- Quark: a lightweight hash
- Conditional differential cryptanalysis of 105 round Grain v1
- The Hash Function Family LAKE
- High order differential attacks on stream ciphers
- \(d\)-monomial tests of nonlinear cellular automata for cryptographic design
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Correlation cube attacks: from weak-key distinguisher to key recovery
- State cycles, initialization and the Trivium stream cipher
- Breaking Grain-128 with dynamic cube attacks
- A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
- An overview of distinguishing attacks on stream ciphers
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Cube Attacks on Tweakable Black Box Polynomials
- A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function
- New Distinguishers Based on Random Mappings against Stream Ciphers
- Selected Areas in Cryptography
- Statistical Analysis of DH1 Cryptosystem
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- On the Security of IV Dependent Stream Ciphers
This page was built for publication: A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458215)