Results 291 to 300 of about 15,368 (325)
Some of the next articles are maybe not open access.

High order differential attacks on stream ciphers

Cryptography and Communications, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Knellwolf, Simon, Meier, Willi
openaire   +2 more sources

Algebraic Attacks on Clock-Controlled Stream Ciphers

2006
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We
Al Hinai, Sultan   +3 more
openaire   +2 more sources

Fast correlation attack on stream cipher ABC v3

Science in China Series F: Information Sciences, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Haina, Li, Lin, Wang, Xiaoyun
openaire   +1 more source

Improved “exhaustive search” attacks on stream ciphers

European Convention on Security and Detection, 1995
Given a certain amount of known keystream from a keystream generator (KG), the most obvious way to determine the state of the generator is to search through all possible states, checking for a match between the resulting and observed keystream. In this paper, we draw attention to two attacks on stream cipher systems which, although their complexity ...
openaire   +1 more source

Correlation attack on stream ciphers

1998
ABSTRACT CORRELATION ATTACK ON STREAM CIPHERS Birinci, Fatih M.Sc, Department of Mathematics Supervisor: Prof. Dr. Münevver Tezer Co-supervisor: Prof. Dr. Ismail Güloğlu September 1998, 91 pages. Pseudorandom sequences generated by linear feedback shift registers with some nonlinear combining functions have been proposed for cryptographic applica tions
openaire   +2 more sources

ANN Based Distinguishing Attack on RC4 Stream Cipher

2012
RC4 is the most widely used stream cipher in many applications. Many Distinguishing Attacks on RC4 system have been published which are based on statistical approaches. These statistical Distinguishing Attacks exploit distribution of bytes, diagraphs and trigraphs in RC4 generated output key stream with respect to random key stream. This paper presents
Ashok K Bhateja, Maiya Din
openaire   +1 more source

Cube attack on stream cipher E0: revisited

International Journal of Information Technology, 2022
Kakumani K. C. Deepthi   +2 more
openaire   +1 more source

Charge-transfer materials for electrochemical water desalination, ion separation and the recovery of elements

Nature Reviews Materials, 2020
Pattarachai Srimuk, Xiao Su, Jeyong Yoon
exaly  

Fast Correlation Attacks on K2 Stream Cipher

IEEE Transactions on Information Theory, 2023
Sudong Ma, Chenhui Jin, Jie Guan
openaire   +1 more source

Home - About - Disclaimer - Privacy