Two generic methods of analyzing stream ciphers
From MaRDI portal
Recommendations
Cited in
(5)- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- scientific article; zbMATH DE number 5501368 (Why is no real title available?)
- Cryptanalysis of Acorn in nonce-reuse setting
- An Analysis of the Hermes8 Stream Ciphers
- Certain Observations on ACORN v3 and the Implications to TMDTO Attacks
This page was built for publication: Two generic methods of analyzing stream ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1799260)