Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
From MaRDI portal
Publication:990129
DOI10.1016/j.ipl.2009.11.006zbMath1209.68223OpenAlexW2015477711WikidataQ122732867 ScholiaQ122732867MaRDI QIDQ990129
Stephen D. Miller, Nathan Keller
Publication date: 2 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.11.006
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- Distinguishing Attacks on the Stream Cipher Py
- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- How Far Can We Go Beyond Linear Cryptanalysis?
- Cryptanalysis of MV3 Stream Cipher
- Fast Software Encryption
- Information Security and Cryptology
This page was built for publication: Distinguishing attacks on stream ciphers based on arrays of pseudo-random words