Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
From MaRDI portal
Publication:990129
DOI10.1016/J.IPL.2009.11.006zbMATH Open1209.68223OpenAlexW2015477711WikidataQ122732867 ScholiaQ122732867MaRDI QIDQ990129FDOQ990129
Authors: Nathan Keller, Stephen D. Miller
Publication date: 2 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.11.006
Recommendations
Cites Work
- How Far Can We Go Beyond Linear Cryptanalysis?
- Title not available (Why is that?)
- Distinguishing Attacks on the Stream Cipher Py
- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Information Security and Cryptology
- Cryptanalysis of MV3 Stream Cipher
- Fast Software Encryption
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
Cited In (6)
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Fast Software Encryption
- Distinguishing Stream Ciphers with Convolutional Filters
- An overview of distinguishing attacks on stream ciphers
- Attack the Dragon
Uses Software
This page was built for publication: Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q990129)