Results 241 to 250 of about 264,704 (267)
Some of the next articles are maybe not open access.
Distinguishing Attack on the NTRUCipher Encryption Scheme
Cybernetics and Systems Analysis, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alekseychuk, A. N., Matiyko, A. A.
openaire +2 more sources
Distinguishing Attack on Bivium
2010 10th IEEE International Conference on Computer and Information Technology, 2010Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function.
Zainab Noferesti +3 more
openaire +1 more source
A linear distinguishing attack on Scream
IEEE International Symposium on Information Theory, 2003. Proceedings., 2003A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of length 298 words, the distinguisher has a detectable advantage. When the keystream length is around 2120 the advantage is very close to 1. This shows certain weaknesses of Scream.
Alexander Maximov, Thomas Johansson
openaire +1 more source
Distinguishing Attack on XO-64
2016 International Conference on Platform Technology and Service (PlatCon), 2016XO-64 block cipher provides a high performance with small hardware requirement in implementation. It is designed in improvement of high applicability, high flexibility, and high reliability in fast and efficient telecommunication system, based on conception of data-dependent operation (DDO); same as some other ciphers MD-64, KT-64, Eagle-64, Eagle-128..
Tran Song Dat Phuc, Changhoon Lee
openaire +1 more source
A Note on Distinguishing Attacks
2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision attack, is presented. The attack can succeed if the part of the state that depends on both the key and the IV is smaller than twice the key size. It is shown that the attack is applicable to block ciphers in OFB mode.
Hakan Englund +2 more
openaire +1 more source
Distinguishing Attack on SN3 Stream Cipher
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result
Mohammad Ali Orumiehchi +1 more
openaire +1 more source

