-
1
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Advances in Cryptology, Crypto'90, A. J. Menezes and S. A. Vanstone Eds, pp, Springer-Verlag
-
E. Biham, A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems." Advances in Cryptology - Crypto'90, LNCS 537, A. J. Menezes and S. A. Vanstone (Eds.), pp. 2-21, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
77649255247
-
-
The ECRYPT eSTREAM project Phase focus ciphers. Available at
-
E. Biham, J. Seberry, "Pypy (Roopy): Another Version of Py." The ECRYPT eSTREAM project Phase 2 focus ciphers. Available at http://www.ecrypt.eu.org/ stream/p2ciphers/py/pypy-p2.ps
-
Pypy (Roopy): Another Version of Py
, pp. 2
-
-
Biham, E.1
Seberry, J.2
-
5
-
-
84974666258
-
Statistical Analysis of the Alleged RC4 Keystream Generator
-
Fast Software Encryption, FSE 2000, B. Schneier Ed, pp, Springer-Verlag
-
S. R. Fluhrer, D. A. McGrew, "Statistical Analysis of the Alleged RC4 Keystream Generator," Fast Software Encryption - FSE 2000, LNCS 1978, B. Schneier (Ed.), pp. 19-30, Springer-Verlag, 2000.
-
(2000)
LNCS 1978
, pp. 19-30
-
-
Fluhrer, S.R.1
McGrew, D.A.2
-
6
-
-
84949223752
-
-
S. R. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography - SAC 2001, LNCS 2259, S. Vaudenay and A.M. Youssef (Eds.), pp. 1-24, Springer-Verlag, 2001.
-
S. R. Fluhrer, I. Mantin, A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," Selected Areas in Cryptography - SAC 2001, LNCS 2259, S. Vaudenay and A.M. Youssef (Eds.), pp. 1-24, Springer-Verlag, 2001.
-
-
-
-
7
-
-
84957380512
-
Linear statistical weakness of alleged RC4 keystream generator
-
Advances in Cryptology, Eurocrypt'97, W. Fumy Ed, pp, Springer-Verlag
-
J. Golić, "Linear statistical weakness of alleged RC4 keystream generator," Advances in Cryptology - Eurocrypt'97, LNCS 1233, W. Fumy (Ed.), pp. 226-238, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 226-238
-
-
Golić, J.1
-
8
-
-
84958958085
-
ISAAC
-
Fast Software Encryption, FSE 1996, D. Gollmann Ed, pp, Springer-Verlag
-
R. J. Jenkins Jr., "ISAAC," Fast Software Encryption - FSE 1996, LNCS 1039, D. Gollmann (Ed.), pp. 41-49, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1039
, pp. 41-49
-
-
Jenkins Jr., R.J.1
-
9
-
-
38149014581
-
Overtaking VEST
-
Fast Software Encryption, FSE 2007, A. Biryukov Ed, Springer-Verlag, to appear
-
A. Joux, J. Reinhard, "Overtaking VEST." Fast Software Encryption - FSE 2007, LNCS, A. Biryukov (Ed.), Springer-Verlag, to appear.
-
LNCS
-
-
Joux, A.1
Reinhard, J.2
-
10
-
-
84928259690
-
-
N. Keller, S. D. Miller, I. Mironov, and R. Venkatesan, MV3: A new word based stream cipher using rapid mixing and revolving buffers, Topics in Cryptology -CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, LNCS 4377, M. Abe (Ed.), pp. 1-19, Springer-Verlag, 2006.
-
N. Keller, S. D. Miller, I. Mironov, and R. Venkatesan, "MV3: A new word based stream cipher using rapid mixing and revolving buffers," Topics in Cryptology -CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, LNCS 4377, M. Abe (Ed.), pp. 1-19, Springer-Verlag, 2006.
-
-
-
-
11
-
-
84944076741
-
-
L. R. Knudsen, W. Meier, B. Preneel, V. Rijmen and S. Verdoolaege, Analysis Methods for (Alleged) RC4, Advances in Cryptology - ASIACRYPT'98, LNCS 1514, K. Ohta and D. Pei (Eds.), pp. 327-341, Springer-Verlag, 1998.
-
L. R. Knudsen, W. Meier, B. Preneel, V. Rijmen and S. Verdoolaege, "Analysis Methods for (Alleged) RC4," Advances in Cryptology - ASIACRYPT'98, LNCS 1514, K. Ohta and D. Pei (Eds.), pp. 327-341, Springer-Verlag, 1998.
-
-
-
-
12
-
-
84958972140
-
-
I. Mantin, A. Shamir, A Practical Attack on Broadcast RC4, Fast Software Encryption - FSE 2001, LNCS 2355, M. Matsui (Ed.), pp. 152-164, Springer-Verlag, 2001.
-
I. Mantin, A. Shamir, "A Practical Attack on Broadcast RC4," Fast Software Encryption - FSE 2001, LNCS 2355, M. Matsui (Ed.), pp. 152-164, Springer-Verlag, 2001.
-
-
-
-
13
-
-
33646812220
-
A Practical Attack on the Fixed RC4 in the WEP Mode
-
Advances in Cryptology, ASIACRYPT 2005, B. Roy Ed, pp, Springer-Verlag
-
I. Mantin, "A Practical Attack on the Fixed RC4 in the WEP Mode." Advances in Cryptology - ASIACRYPT 2005, LNCS 3788, B. Roy (Ed.), pp. 395-411, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3788
, pp. 395-411
-
-
Mantin, I.1
-
14
-
-
24944554565
-
Predicting and Distinguishing Attacks on RC4 Keystream Generator
-
Advances in Cryptography, EUROCRYPT 2005, R. Cramer Ed, pp, Springer-Verlag
-
I. Mantin, "Predicting and Distinguishing Attacks on RC4 Keystream Generator." Advances in Cryptography - EUROCRYPT 2005, LNCS 3494, R. Cramer (Ed.), pp. 491-506, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
15
-
-
84937401544
-
-
I. Mironov, (Not so) random shuffles of RC4, Advances in Cryptology -CRYPTO'02, LNCS 2442, M. Yung (Ed.), pp. 304-319, Springer-Verlag, 2002.
-
I. Mironov, "(Not so) random shuffles of RC4," Advances in Cryptology -CRYPTO'02, LNCS 2442, M. Yung (Ed.), pp. 304-319, Springer-Verlag, 2002.
-
-
-
-
16
-
-
84859054985
-
Cryptanalysis of RC4-like Ciphers
-
Selected Areas in Cryptography, SAC'98, S. Tavares, H. Meijer Eds, pp, Springer-Verlag
-
S. Mister and S. E. Tavares, "Cryptanalysis of RC4-like Ciphers," Selected Areas in Cryptography - SAC'98, LNCS 1556, S. Tavares, H. Meijer (Eds.), pp. 131-143, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1556
, pp. 131-143
-
-
Mister, S.1
Tavares, S.E.2
-
17
-
-
26444620896
-
A NewWeakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
-
Fast Software Encryption, FSE 2004, B. Roy Ed, pp, Springer-Verlag
-
S. Paul, B. Preneel, "A NewWeakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher," Fast Software Encryption - FSE 2004, LNCS 3017, B. Roy (Ed.), pp. 245-259, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3017
, pp. 245-259
-
-
Paul, S.1
Preneel, B.2
-
18
-
-
33746753311
-
-
S. Paul, B. Preneel, S. Sekar, Distinguishing Attack on the Stream Cipher Py. Fast Software Encryption - FSE 2006, LNCS 4047, M. J. Robshaw (Ed.), pp. 405-421, Spring-Verlag, 2006.
-
S. Paul, B. Preneel, S. Sekar, "Distinguishing Attack on the Stream Cipher Py." Fast Software Encryption - FSE 2006, LNCS 4047, M. J. Robshaw (Ed.), pp. 405-421, Spring-Verlag, 2006.
-
-
-
-
19
-
-
77649251322
-
-
S. Paul, B. Preneel, On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Advances in Cryptology - ASIACRYPT 2006, LNCS 4284, K. Chen, and X. Lai (Eds.), pp. 69-83, Spring-Verlag, 2006.
-
S. Paul, B. Preneel, "On the (In)security of Stream Ciphers Based on Arrays and Modular Addition." Advances in Cryptology - ASIACRYPT 2006, LNCS 4284, K. Chen, and X. Lai (Eds.), pp. 69-83, Spring-Verlag, 2006.
-
-
-
-
20
-
-
33746766257
-
Cryptanalysis of the Stream Cipher DECIM
-
Fast Software Encryption, FSE 2006, M. J. Robshaw ed, pp, Springer-Verlag
-
H. Wu, B. Preneel, "Cryptanalysis of the Stream Cipher DECIM." Fast Software Encryption - FSE 2006, LNCS 4047, M. J. Robshaw (ed.), pp. 30-40, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4047
, pp. 30-40
-
-
Wu, H.1
Preneel, B.2
-
21
-
-
33746684991
-
Resynchronization Attacks on WG and LEX
-
Fast Software Encryption, FSE 2006, M. J. Robshaw ed, pp, Springer-Verlag
-
H. Wu, B. Preneel, "Resynchronization Attacks on WG and LEX." Fast Software Encryption - FSE 2006, LNCS 4047, M. J. Robshaw (ed.), pp. 422-432, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4047
, pp. 422-432
-
-
Wu, H.1
Preneel, B.2
|