On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
From MaRDI portal
Publication:5459070
DOI10.1007/11935230_5zbMath1172.94595OpenAlexW1640978376MaRDI QIDQ5459070
Publication date: 24 April 2008
Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11935230_5
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items (9)
On the structural weakness of the GGHN stream cipher ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ Cryptanalysis of the Full Spritz Stream Cipher ⋮ Distinguishing attacks on stream ciphers based on arrays of pseudo-random words ⋮ Distinguishing Attack Against TPypy ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ On the Evolution of GGHN Cipher ⋮ New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
This page was built for publication: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition