메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 58-72

Overtaking VEST

Author keywords

Chosen IV attack; Inner collision; Stream cipher

Indexed keywords

COMPUTATIONAL COMPLEXITY; MEDIUM ACCESS CONTROL; MESSAGE PASSING;

EID: 38149014581     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_4     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 1
    • 84867937546 scopus 로고    scopus 로고
    • A new 128 bit key stream cipher : LEX. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/013
    • Biryukov, A.: A new 128 bit key stream cipher : LEX. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/013 (2005), http://www.ecrypt.eu.org/stream
    • (2005)
    • Biryukov, A.1
  • 2
    • 38149053610 scopus 로고    scopus 로고
    • Biryukov, A.: The Design of a Stream Cipher LEX. In: Biham, E., Youssef, A. (eds.) Selected Areas in Cryptography - SAC 2006, LNCS, 4356, Springer, Heidelberg (to appear, 2007)
    • Biryukov, A.: The Design of a Stream Cipher LEX. In: Biham, E., Youssef, A. (eds.) Selected Areas in Cryptography - SAC 2006, LNCS, vol. 4356, Springer, Heidelberg (to appear, 2007)
  • 3
    • 84937418785 scopus 로고    scopus 로고
    • Why Textbook ElGamal and RSA Encryption are Insecure
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Boneh, D., Joux, A., Nguyen, P.: Why Textbook ElGamal and RSA Encryption are Insecure. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 30-43. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 30-43
    • Boneh, D.1    Joux, A.2    Nguyen, P.3
  • 4
    • 84957643546 scopus 로고    scopus 로고
    • Differential Collisions in SHA-0
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 5
    • 38149022082 scopus 로고    scopus 로고
    • Cryptanalysis of Pomaranch. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/060
    • Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/060 (2005) http://www.ecrypt.eu.org/ stream
    • (2005)
    • Cid, C.1    Gilbert, H.2    Johansson, T.3
  • 6
    • 38149016456 scopus 로고    scopus 로고
    • ECRYPT, ECRYPT Stream Cipher Project, IST-2002-507932
    • ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932, http://www.ecrypt.eu.org/stream
    • eSTREAM
  • 7
    • 38149105239 scopus 로고    scopus 로고
    • Cryptanalysis of ECRYPT Candidates F-FCSR-8 and F-FCSR-H. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/046
    • Jaulmes, E., Muller, F.: Cryptanalysis of ECRYPT Candidates F-FCSR-8 and F-FCSR-H. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/046 (2005), http://www.ecrypt.eu.org/stream
    • (2005)
    • Jaulmes, E.1    Muller, F.2
  • 8
    • 84893553748 scopus 로고    scopus 로고
    • VEST - Hardware-Dedicated Stream Ciphers. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/032
    • O'Neil, S., Gittins, B., Landman, H.: VEST - Hardware-Dedicated Stream Ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/032 (2005), http://www.ecrypt.eu.org/stream
    • (2005)
    • O'Neil, S.1    Gittins, B.2    Landman, H.3
  • 9
    • 38149013416 scopus 로고    scopus 로고
    • O'Neil, S., Gittins, B., Landman, H.: VEST Ciphers. eSTREAM, ECRYPT Stream Cipher Project (2006), http://www.ecrypt.eu.org/stream/p2ciphers/vest/ vest_p2.pdf
    • O'Neil, S., Gittins, B., Landman, H.: VEST Ciphers. eSTREAM, ECRYPT Stream Cipher Project (2006), http://www.ecrypt.eu.org/stream/p2ciphers/vest/ vest_p2.pdf
  • 10
    • 85086422630 scopus 로고    scopus 로고
    • n/4) algorithm for certain NP-complete problems. SIAM Journal on Computing 10(3), 456-464 (1981)
    • n/4) algorithm for certain NP-complete problems. SIAM Journal on Computing 10(3), 456-464 (1981)
  • 11
    • 38149025747 scopus 로고    scopus 로고
    • Chosen IV Attack on Stream Cipher WG. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/045
    • Wu, H., Preneel, B.: Chosen IV Attack on Stream Cipher WG. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/045 (2005), http://www.ecrypt.eu.org/ stream
    • (2005)
    • Wu, H.1    Preneel, B.2
  • 12
    • 37149027724 scopus 로고    scopus 로고
    • Key Recovery Attack on Py and Pypy with Chosen IVs. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/052
    • Wu, H., Preneel, B.: Key Recovery Attack on Py and Pypy with Chosen IVs. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/052 (2006), http://www.ecrypt.eu.org/stream
    • (2006)
    • Wu, H.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.