Results 291 to 300 of about 15,368 (325)
Some of the next articles are maybe not open access.
High order differential attacks on stream ciphers
Cryptography and Communications, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Knellwolf, Simon, Meier, Willi
openaire +2 more sources
Algebraic Attacks on Clock-Controlled Stream Ciphers
2006We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We
Al Hinai, Sultan +3 more
openaire +2 more sources
Fast correlation attack on stream cipher ABC v3
Science in China Series F: Information Sciences, 2008zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Haina, Li, Lin, Wang, Xiaoyun
openaire +1 more source
Improved “exhaustive search” attacks on stream ciphers
European Convention on Security and Detection, 1995Given a certain amount of known keystream from a keystream generator (KG), the most obvious way to determine the state of the generator is to search through all possible states, checking for a match between the resulting and observed keystream. In this paper, we draw attention to two attacks on stream cipher systems which, although their complexity ...
openaire +1 more source
Correlation attack on stream ciphers
1998ABSTRACT CORRELATION ATTACK ON STREAM CIPHERS Birinci, Fatih M.Sc, Department of Mathematics Supervisor: Prof. Dr. Münevver Tezer Co-supervisor: Prof. Dr. Ismail Güloğlu September 1998, 91 pages. Pseudorandom sequences generated by linear feedback shift registers with some nonlinear combining functions have been proposed for cryptographic applica tions
openaire +2 more sources
ANN Based Distinguishing Attack on RC4 Stream Cipher
2012RC4 is the most widely used stream cipher in many applications. Many Distinguishing Attacks on RC4 system have been published which are based on statistical approaches. These statistical Distinguishing Attacks exploit distribution of bytes, diagraphs and trigraphs in RC4 generated output key stream with respect to random key stream. This paper presents
Ashok K Bhateja, Maiya Din
openaire +1 more source
Cube attack on stream cipher E0: revisited
International Journal of Information Technology, 2022Kakumani K. C. Deepthi +2 more
openaire +1 more source
Fast Correlation Attacks on K2 Stream Cipher
IEEE Transactions on Information Theory, 2023Sudong Ma, Chenhui Jin, Jie Guan
openaire +1 more source

